SCOPUS Citation Analysis
Source: Scopus.com
last update: June 18, 2020
JOIV : International Journal on Informatics Visualization is cited by articles on SCOPUS database at least 117 times since published in March 2017. The number citation calculation for each year is:
YEAR | NUMBER OF CITATION |
2020 | 19 |
2019 | 68 |
2018 | 26 |
2017 | 4 |
We searching with query on Scopus.com: REF ( "JOIV : International Journal on Informatics Visualization" ) OR REF ( "International Journal on Informatics Visualization" ) OR REF ( "JOIV" )
Citation details:
>> Citedness in scopus : 117 times (from 53 documents)
01 >> M. Ibraigheeth, & S. Fadzli "Core Factors for Software Projects Success," JOIV : International Journal on Informatics Visualization, vol. 3, no. 1, , pp. 69 - 74, Jan. 2019. https://doi.org/10.30630/joiv.3.1.217
Cited By (Scopus Documents) :
03>> M. Jamshidi, A. Shaltooki, Z. Dagal Zadeh, & A. Mohammad Darwesh "A Dynamic ID Assignment Mechanism to Defend Against Node Replication Attack in Static Wireless Sensor Networks," JOIV : International Journal on Informatics Visualization, vol. 3, no. 1, , pp. 13 - 17, Sep. 2018. https://doi.org/10.30630/joiv.3.1.161
Cited By (Scopus Documents) :
- Jamshidi, M., Esnaashari, M., Darwesh, A. M., & Meybodi, M. R. (2019). Detecting sybil nodes in stationary wireless sensor networks using learning automaton and client puzzles. IET Communications, 13(13), 1988-1997. doi:10.1049/iet-com.2018.6036
- Jamshidi, M., Ranjbari, M., Esnaashari, M., Darwesh, A. M., & Meybodi, M. R. (2019). A new algorithm to defend against sybil attack in staticwireless sensor networks using mobile observer sensor nodes. Ad-Hoc and Sensor Wireless Networks, 43(3-4), 213-238. Retrieved from www.scopus.com
- Jamshidi, M., Poor, S. S. A., Qader, N. N., Esnaashari, M., & Meybodi, M. R. (2019). A lightweight algorithm against replica node attack in mobile wireless sensor networks using learning agents. IEIE Transactions on Smart Processing and Computing, 8(1), 58-70. doi:10.5573/IEIESPC.2019.8.1.058
- Jamshidi, M., Esnaashari, M., Darwesh, A. M., & Meybodi, M. R. (2019). Using time-location tags and watchdog nodes to defend against node replication attack in mobile wireless sensor networks. International Journal of Wireless Information Networks, doi:10.1007/s10776-019-00469-0
- Giardino, D., Matta, M., & Spanò, S. (2019). A feature extractor IC for acoustic emission non-destructive testing. International Journal on Advanced Science, Engineering and Information Technology, 9(2), 538-543. doi:10.18517/ijaseit.9.2.8281
- Jamshidi, M., Darwesh, A. M., Lorenc, A., Ranjbari, M., & Meybodi, M. R. (2018). A precise algorithm for detecting malicious sybil nodes in mobile wireless sensor networks. IEIE Transactions on Smart Processing and Computing, 7(6), 457-466. doi:10.5573/IEIESPC.2018.7.6.457
- Jamshidi M, Poor SSA, Arghavani A, Esnaashari M, Shaltooki AA, Meybodi MR. A simple, lightweight, and precise algorithm to defend against replica node attacks in mobile wireless networks using neighboring information. Ad Hoc Networks [Internet]. Elsevier BV; 2020 Apr;100:102081. Available from: http://dx.doi.org/10.1016/j.adhoc.2020.102081
04>> N. Sharma, & P. Yalla "Developing Research Questions in Natural Language Processing and Software Engineering," JOIV : International Journal on Informatics Visualization, vol. 2, no. 4, , pp. 268 - 270, Aug. 2018. https://doi.org/10.30630/joiv.2.4.159
Cited By (Scopus Documents) :
05>> H. Mohd Shah, M. Ab Rashid, Z. Kamis, M. Mohd Aras, N. Mohd Ali, F. Wasbari, & M. Bin Abu Bakar "Design and Develop an Autonomous UAV Airship for Indoor Surveillance and Monitoring Applications," JOIV : International Journal on Informatics Visualization, vol. 2, no. 1, , pp. 1 - 7, Jan. 2018. https://doi.org/10.30630/joiv.2.1.33
Cited By (Scopus Documents) :
06>> H. Rahman, N. Arbaiy, M. Che Lah, & N. Hassan "Exploratory Study of Kohonen Network for Human Health State Classification," JOIV : International Journal on Informatics Visualization, vol. 2, no. 3-2, , pp. 209 - 214, Jun. 2018. https://doi.org/10.30630/joiv.2.3-2.143
Cited By (Scopus Documents) :
- Giardino, D., Matta, M., & Spanò, S. (2019). An automatic AW-SOM VHDL IP-core generator. International Journal on Advanced Science, Engineering and Information Technology, 9(4), 1136-1141. Retrieved from www.scopus.com
- Silvestri, F., Acciarito, S., & Khanal, G. M. (2019). Relationship between mathematical parameters of modified van der pol oscillator model and ECG morphological features. International Journal on Advanced Science, Engineering and Information Technology, 9(2), 601-608. doi:10.18517/ijaseit.9.2.8296
- De Luca, E., Fallucchi, F., Giuliano, R., Incarnato, G., & Mazzenga, F. (2019). Analysing and visualizing tweets for U.S. president popularity. International Journal on Advanced Science, Engineering and Information Technology, 9(2), 692-699. doi:10.18517/ijaseit.9.2.8284
07>> K. Albeladi, & S. Abdullah "Application of Genetic Algorithm and Personal Informatics in Stock Market," JOIV : International Journal on Informatics Visualization, vol. 2, no. 2, , pp. 68 - 72, Mar. 2018. https://doi.org/10.30630/joiv.2.2.115
Cited By (Scopus Documents) :
08>> S. PSV "A Cloud Based Irrigation System for Agriculture," JOIV : International Journal on Informatics Visualization, vol. 2, no. 1, , pp. 28 - 30, Jan. 2018. https://doi.org/10.30630/joiv.2.1.91
Cited By (Scopus Documents) :
09>> S. Khan, N. Mohd Nawi, A. Shahzad, A. Ullah, M. Mushtaq, J. Mir, & M. Aamir "Comparative Analysis for Heart Disease Prediction," JOIV : International Journal on Informatics Visualization, vol. 1, no. 4-2, , pp. 227 - 231, Nov. 2017. https://doi.org/10.30630/joiv.1.4-2.66
Cited By (Scopus Documents) :
- Khan, S. N., Nawi, N. M., Imrona, M., Shahzad, A., Ullah, A., & Atta-ur-Rahman. (2018). Opinion mining summarization and automation process: A survey. International Journal on Advanced Science, Engineering and Information Technology, 8(5), 1836-1844. doi:10.18517/ijaseit.8.5.5002
- De Luca, E., Fallucchi, F., Giuliano, R., Incarnato, G., & Mazzenga, F. (2019). Analysing and visualizing tweets for U.S. president popularity. International Journal on Advanced Science, Engineering and Information Technology, 9(2), 692-699. doi:10.18517/ijaseit.9.2.8284
10>> A. Ullah, N. Mohd Nawi, A. Shahzad, S. Khan, & M. Aamir "An E-learning System in Malaysia based on Green Computing and Energy Level," JOIV : International Journal on Informatics Visualization, vol. 1, no. 4-2, , pp. 184 -187, Nov. 2017. https://doi.org/10.30630/joiv.1.4-2.63
Cited By (Scopus Documents) :
- Khan, S. N., Aljaberi, M. A., & Muammar, S. (2019). Success factors model for green computing implementations. International Journal of Technology Management and Sustainable Development, 18(1), 37-54. doi:10.1386/tmsd.18.1.37_1
- Ullah, A., Nawi, N. M., Uddin, J., Baseer, S., & Rashed, A. H. (2019). Artificial bee colony algorithm used for load balancing in cloud computing: Review. IAES International Journal of Artificial Intelligence, 8(2), 156-167. doi:10.11591/ijai.v8.i2.pp156-167
11>>K. Yankov "Specific Language for Robot Trajectory Generation," JOIV : International Journal on Informatics Visualization, vol. 1, no. 4, , pp. 157- 164, Dec 2017. https://doi.org/10.30630/joiv.1.4.56
Cited By (Scopus Documents) :
12>> W. Jin, & D. Kim "A Sleep-Awake Scheme Based on CoAP for Energy-Efficiency in Internet of Things," JOIV : International Journal on Informatics Visualization, vol. 1, no. 4, , pp. 110 - 114, Nov. 2017. https://doi.org/10.30630/joiv.1.4.37
Cited By (Scopus Documents) :
- Jin, W., & Kim, D. (2019). Resource management based on OCF for device self-registration and status detection in IoT networks. Electronics (Switzerland), 8(3) doi:10.3390/electronics8030311
- Giardino, D., Matta, M., & Spanò, S. (2019). A feature extractor IC for acoustic emission non-destructive testing. International Journal on Advanced Science, Engineering and Information Technology, 9(2), 538-543. doi:10.18517/ijaseit.9.2.8281
- Jin, W., & Kim, D. (2018). Consistent registration and discovery scheme for devices and web service providers based on RAML using embedded RD in OCF IoT network. Sustainability (Switzerland), 10(12) doi:10.3390/su10124706
- Jin, W., & Kim, D. (2018). Development of virtual resource based IoT proxy for bridging heterogeneous web services in IoT networks. Sensors (Switzerland), 18(6) doi:10.3390/s18061721
- Jin, W., & Kim, D. (2018). A sleep scheme based on MQ broker using subscribe/publish in IoT network. International Journal on Advanced Science, Engineering and Information Technology, 8(2), 539-545. doi:10.18517/ijaseit.8.2.3099
13>> K. Madadipouya "A Survey on Data Mining Algorithms and Techniques in Medicine," JOIV : International Journal on Informatics Visualization, vol. 1, no. 3, , pp. 61-71, Jun. 2017. https://doi.org/10.30630/joiv.1.3.25
Cited By (Scopus Documents) :
- Silvestri, F., Acciarito, S., & Khanal, G. M. (2019). Relationship between mathematical parameters of modified van der pol oscillator model and ECG morphological features. International Journal on Advanced Science, Engineering and Information Technology, 9(2), 601-608. doi:10.18517/ijaseit.9.2.8296
- Ahmar, A. S., Napitupulu, D., Rahim, R., Hidayat, R., Sonatha, Y., & Azmi, M. (2018). Using K-means clustering to cluster provinces in indonesia. Paper presented at the Journal of Physics: Conference Series, , 1028(1) doi:10.1088/1742-6596/1028/1/012006 Retrieved from www.scopus.com
- De Luca, E., Fallucchi, F., Giuliano, R., Incarnato, G., & Mazzenga, F. (2019). Analysing and visualizing tweets for U.S. president popularity. International Journal on Advanced Science, Engineering and Information Technology, 9(2), 692-699. doi:10.18517/ijaseit.9.2.8284
14>> A. Erianda, & I. Rahmayuni "Improvement of Email And Twitter Classification Accuracy Based On Preprocessing Bayes Naive Classifier Optimization In Integrated Digital Assistant," JOIV : International Journal on Informatics Visualization, vol. 1, no. 2, , pp. 53-56, May. 2017. https://doi.org/10.30630/joiv.1.2.21
Cited By (Scopus Documents) :
- Silvestri, F., Acciarito, S., & Khanal, G. M. (2019). Relationship between mathematical parameters of modified van der pol oscillator model and ECG morphological features. International Journal on Advanced Science, Engineering and Information Technology, 9(2), 601-608. doi:10.18517/ijaseit.9.2.8296
- De Luca, E., Fallucchi, F., Giuliano, R., Incarnato, G., & Mazzenga, F. (2019). Analysing and visualizing tweets for U.S. president popularity. International Journal on Advanced Science, Engineering and Information Technology, 9(2), 692-699. doi:10.18517/ijaseit.9.2.8284
15>> M. Mohd Yunus, S. Gopala Krishnan, N. Mohd Nawi, & E. Mat Surin "Study on Database Management System Security Issues," JOIV : International Journal on Informatics Visualization, vol. 1, no. 4-2, , pp. 192 - 194, Nov. 2017. https://doi.org/10.30630/joiv.1.4-2.76
Cited By (Scopus Documents) :
- Voitovych, O., Kupershtein, L., Lukichov, V., & Mikityuk, I. (2019). Multilayer access for database protection. Paper presented at the 2018 International Scientific-Practical Conference on Problems of Infocommunications Science and Technology, PIC S and T 2018 - Proceedings, 474-478. doi:10.1109/INFOCOMMST.2018.8632152 Retrieved from www.scopus.com
- Tan, K., & Lim, C. (2019). A case study of TNB network solution & support (NSS) inventory information system: A quick printable and non-redundancy web-based application. International Journal of Supply Chain Management, 8(1), 740-745. Retrieved from www.scopus.com
- Galushka, V., Marshakov, D., Aydinyan, A., Tsvetkova, O., & Fathi, D. (2018). The key management method for the system of end-to-end symmetric database encryption. Paper presented at the MATEC Web of Conferences, , 226 doi:10.1051/matecconf/201822605002 Retrieved from www.scopus.com
16>> H. Amnur "Customer Relationship Management and Machine Learning Technology for Identifying the Customer," JOIV : International Journal on Informatics Visualization, vol. 1, no. 1, , pp. 12-15, Mar. 2017. https://doi.org/10.30630/joiv.1.1.10
Cited By (Scopus Documents) :
17>> S. Fashoto, O. Amaonwu, & A. Afolorunsho "Development of A Decision Support System on Employee Performance Appraisal using AHP Model," JOIV : International Journal on Informatics Visualization, vol. 2, no. 4, , pp. 262 - 267, Aug. 2018. https://doi.org/10.30630/joiv.2.4.160
Cited By (Scopus Documents) :
- Pardede, A. M. H., Br Sitepu, L. P., Zarlis, M., Tulus, Iskandar, A., Sriadhi, S., . . . Winarno, E. (2019). Application of message security application using vigenere cipher algorithm utilizing one time pad (OTP) algorithm as a key generator. Paper presented at the Journal of Physics: Conference Series, , 1363(1) doi:10.1088/1742-6596/1363/1/012080 Retrieved from www.scopus.com
- Rayuwati, Mustapa M, Taliang A, Iskandar A. Comparison of Encoding and Decoding Methods for Binary Files. Journal of Physics: Conference Series [Internet]. IOP Publishing; 2019 Dec;1364:012024. Available from: http://dx.doi.org/10.1088/1742-6596/1364/1/012024
- Erwinsyah A, Yuliwati, Andriany L, Fithra H. Three-Dimensional Text Applications with OpenGL. Journal of Physics: Conference Series [Internet]. IOP Publishing; 2019 Dec;1364:012048. Available from: http://dx.doi.org/10.1088/1742-6596/1364/1/012048
- Iskandar A, Sumartono E, Segar S, Fitriani. Software Design for Depiction and Calculation of Curves Area on Cartesian Coordinates. Journal of Physics: Conference Series [Internet]. IOP Publishing; 2019 Dec;1364:012042. Available from: http://dx.doi.org/10.1088/1742-6596/1364/1/012042
- Winarno E, Hartono H, Erliana CI, Fithra H. Designing Red Eye Reduction Software with Intensity Color Checking Technique. Journal of Physics: Conference Series [Internet]. IOP Publishing; 2019 Dec;1364:012030. Available from: http://dx.doi.org/10.1088/1742-6596/1364/1/012030
- Taufiq R, Faridi, Hardono J. Decision Support of System Performance Appraisal of Education Services Using Servqual And Analytical Hierarchy Process Method. Journal of Physics: Conference Series [Internet]. IOP Publishing; 2020 Mar;1477:032022. Available from: http://dx.doi.org/10.1088/1742-6596/1477/3/032022
18>> M. Samuel, M. Mohamad, S. Saad, & M. Hussein "Development of Edge-Based Lane Detection Algorithm using Image Processing," JOIV : International Journal on Informatics Visualization, vol. 2, no. 1, , pp. 19 - 22, Jan. 2018. https://doi.org/10.30630/joiv.2.1.101
Cited By (Scopus Documents) :
- Wang, B., Li, H., & Hu, W. (2019). Research on key techniques of multi-resolution coastline image fusion based on optimal seam-line. Earth Science Informatics, doi:10.1007/s12145-019-00421-z
- Na'am, J., Harlan, J., Syelly, R., & Ramadhanu, A. (2019). Filter technique of medical image on multiple morphological gradient (MMG) method. Telkomnika (Telecommunication Computing Electronics and Control), 17(3), 1317-1323. doi:10.12928/TELKOMNIKA.v17i3.9722
19>> R. Tamilkodi, G. Kumari, & S. Perumal "A new approach towards Image retrieval using texture statistical methods," JOIV : International Journal on Informatics Visualization, vol. 2, no. 1, , pp. 13 - 18, Jan. 2018. https://doi.org/10.30630/joiv.2.1.60
Cited By (Scopus Documents) :
20>> M. Virk, & V. Chauhan "Big Data and Shipping-managing vessel performance," JOIV : International Journal on Informatics Visualization, vol. 2, no. 2, , pp. 73 - 75, Mar. 2018. https://doi.org/10.30630/joiv.2.2.116
Cited By (Scopus Documents) :
21>> Y. Yin, N. Arbaiy, & J. Din "Financial Records Management System for Micro Enterprise," JOIV : International Journal on Informatics Visualization, vol. 1, no. 4-2, , pp. 209 - 213, Nov. 2017. https://doi.org/10.30630/joiv.1.4-2.70
Cited By (Scopus Documents) :
22>> S. Suroto "A Review of Defense Against Slow HTTP Attack," JOIV : International Journal on Informatics Visualization, vol. 1, no. 4, , pp. 127 - 134, Nov. 2017. https://doi.org/10.30630/joiv.1.4.51
Cited By (Scopus Documents) :
23>> M. Kumar, & P. j "Analysis of Network Function Virtualization and Software Defined Virtualization," JOIV : International Journal on Informatics Visualization, vol. 1, no. 4, , pp. 122 - 126, Nov. 2017. https://doi.org/10.30630/joiv.1.4.40
Cited By (Scopus Documents) :
- Mathivanan, S., & Jayagopal, P. (2019). A big data virtualization role in agriculture: A comprehensive review. Walailak Journal of Science and Technology, 16(2), 55-70. Retrieved from www.scopus.com
- Rahim, R., Manurung, R. T., Napitupulu, D., Ratnadewi, R., Nurdiyanto, H., Rangka, I. B., . . . Suseno, N. (2018). Comparison of time in processing frame as an error detection mechanism in network transmission. Paper presented at the IOP Conference Series: Materials Science and Engineering, , 420(1) doi:10.1088/1757-899X/420/1/012085 Retrieved from www.scopus.com
24>> R. Roslan, & A. Ahmad "3D Spatial Visualisation Skills Training Application for School Students Using Hologram Pyramid," JOIV : International Journal on Informatics Visualization, vol. 1, no. 4, , pp. 170 - 174, Nov. 2017. https://doi.org/10.30630/joiv.1.4.61
Cited By (Scopus Documents) :
- Tayeh, R., Bademosi, F. M., & Issa, R. R. A. (2019). Interactive holograms for better construction information communication. Paper presented at the Computing in Civil Engineering 2019: Visualization, Information Modeling, and Simulation - Selected Papers from the ASCE International Conference on Computing in Civil Engineering 2019, 112-119. doi:10.1061/9780784482421.015 Retrieved from www.scopus.com
- Rahim, R., Kurniasih, N., Hasibuan, A., Andriany, L., Najmurrokhman, A., Supriyanto, S., . . . Abdullah, D. (2018). Congklak, a traditional game solution approach with breadth first search. Paper presented at the MATEC Web of Conferences, , 197 doi:10.1051/matecconf/201819703007 Retrieved from www.scopus.com
25>> D. Chandravathi, & P. Lakshmi "Advanced Homomorphic Encryption for Cloud Data Security," JOIV : International Journal on Informatics Visualization, vol. 1, no. 1, , pp. 1-4, Mar. 2017. https://doi.org/10.30630/joiv.1.1.11
Cited By (Scopus Documents) :
- Pardede, A. M. H., Br Sitepu, L. P., Zarlis, M., Tulus, Iskandar, A., Sriadhi, S., . . . Winarno, E. (2019). Application of message security application using vigenere cipher algorithm utilizing one time pad (OTP) algorithm as a key generator. Paper presented at the Journal of Physics: Conference Series, , 1363(1) doi:10.1088/1742-6596/1363/1/012080 Retrieved from www.scopus.com
- Maryanti, S., Wiyati, R., Falimu, Saadjad, K. A., & Tunggala, S. (2019). Key improvement in rijndael algoritm for security process. Journal of Advanced Research in Dynamical and Control Systems, 11(5), 631-633. Retrieved from www.scopus.com
- Rahim, R., Kurniasih, N., Pohan, N., Sriadhi, S., Listyorini, T., Nanuru, R. F., . . . Napitupulu, D. (2018). Pseudo-prime number simulation and its application for security purpose. Paper presented at the MATEC Web of Conferences, , 197 doi:10.1051/matecconf/201819703005 Retrieved from www.scopus.com
26>> T. Tung Khuat, & M. Le "An Application of Artificial Neural Networks and Fuzzy Logic on the Stock Price Prediction Problem," JOIV : International Journal on Informatics Visualization, vol. 1, no. 2, , pp. 40-49, Apr. 2017. https://doi.org/10.30630/joiv.1.2.20
Cited By (Scopus Documents) :
- Li, J., & Tan, Y. (2019). A comprehensive review of the fireworks algorithm. ACM Computing Surveys, 52(6) doi:10.1145/3362788
- Janková, Z. (2019). Application of artificial neural networks and fuzzy logic in stock trading. Paper presented at the Proceedings of the 33rd International Business Information Management Association Conference, IBIMA 2019: Education Excellence and Innovation Management through Vision 2020, 2610-2619. Retrieved from www.scopus.com
- Serrano, W. (2019). Fintech bitcoin smart investment based on the random neural network with a genetic algorithm doi:10.1007/978-3-319-97982-3_11 Retrieved from www.scopus.com
- Susi, G., Acciarito, S., Pascual, T., Cristini, A., & Maestú, F. (2019). Towards neuro-inspired electronic oscillators based on the dynamical relaying mechanism. International Journal on Advanced Science, Engineering and Information Technology, 9(2), 569-574. doi:10.18517/ijaseit.9.2.8347
- Janková, Z., & Dostál, P. (2019). Utilization of artificial intelligence for sensitivity analysis in the stock market. Acta Universitatis Agriculturae Et Silviculturae Mendelianae Brunensis, 67(5), 1269-1283. doi:10.11118/actaun201967051269
- Serrano, W. (2019). Genetic and deep learning clusters based on neural networks for management decision structures. Neural Computing and Applications, doi:10.1007/s00521-019-04231-8
- Serrano, W. (2018). Fintech model: The random neural network with genetic algorithm. Paper presented at the Procedia Computer Science, , 126 537-546. doi:10.1016/j.procS.2018.07.288 Retrieved from www.scopus.com
- Serrano, W. (2018). The random neural network with a genetic algorithm and deep learning clusters in fintech: Smart investment doi:10.1007/978-3-319-92007-8_26 Retrieved from www.scopus.com
27>> A. Syahir, & C. Wen "Secure Login Mechanism for Online Banking," JOIV : International Journal on Informatics Visualization, vol. 2, no. 3-2, , pp. 179 - 183, Jun. 2018. https://doi.org/10.30630/joiv.2.3-2.136
Cited By (Scopus Documents) :
28>> J. Na`am "Accuracy of Panoramic Dental X-Ray Imaging in Detection of Proximal Caries with Multiple Morpological Gradient (mMG) Method," JOIV : International Journal on Informatics Visualization, vol. 1, no. 1, , pp. 5-11, Mar 2017. https://doi.org/10.30630/joiv.1.1.13
Cited By (Scopus Documents) :
- Naàm, J., Harlan, J., Madenda, S., Santony, J., & Suharinto, C. (2018). Detection of proximal caries at the molar teeth using edge enhancement algorithm. International Journal of Electrical and Computer Engineering, 8(5), 3259-3266. doi:10.11591/ijece.v8i5.pp.3259-3266
- Naàm, J., Santony, J., Yuhandri, Sumijan, & Nurcahyo, G. W. (2018). Enlarge medical image using line-column interpolation (LCI) method. International Journal of Electrical and Computer Engineering, 8(5), 3620-3626. doi:10.11591/ijece.v8i5.pp3620-3626
- Na'am, J., Harlan, J., Nercahyo, G. W., Arlis, S., Sahari, Mardison, & Rani, L. N. (2017). Detection of infiltrate on infant chest X-ray. Telkomnika (Telecommunication Computing Electronics and Control), 15(4), 1943-1951. doi:10.12928/TELKOMNIKA.v15i4.3163
- Na'am, J., Harlan, J., Madenda, S., & Wibowo, E. P. (2017). Image processing of panoramic dental X-ray for identifying proximal caries. Telkomnika (Telecommunication Computing Electronics and Control), 15(2), 702-708. doi:10.12928/TELKOMNIKA.v15i2.4622
- Na’am, J. (2017). Edge detection on objects of medical image with enhancement multiple morphological gradient method. Paper presented at the International Conference on Electrical Engineering, Computer Science and Informatics (EECSI), , 2017-December doi:10.1109/EECSI.2017.8239085 Retrieved from www.scopus.com
29>> K. Hussain, M. Mohd Salleh, S. Cheng, & R. Naseem "Common Benchmark Functions for Metaheuristic Evaluation: A Review," JOIV : International Journal on Informatics Visualization, vol. 1, no. 4-2, , pp. 218 - 223, Nov. 2017. https://doi.org/10.30630/joiv.1.4-2.65
Cited By (Scopus Documents) :
- Ikeda, S., & Ooka, R. (2019). Application of differential evolution-based constrained optimization methods to district energy optimization and comparison with dynamic programming. Applied Energy, 254 doi:10.1016/j.apenergy.2019.113670
- Morales-Castañeda, B., Zaldívar, D., Cuevas, E., Maciel-Castillo, O., Aranguren, I., & Fausto, F. (2019). An improved simulated annealing algorithm based on ancient metallurgy techniques. Applied Soft Computing Journal, 84 doi:10.1016/j.asoc.2019.105761
- Ikeda, S., & Ooka, R. (2019). Comparison of metaheuristics and dynamic programming for district energy optimization. Paper presented at the IOP Conference Series: Earth and Environmental Science, , 294(1) doi:10.1088/1755-1315/294/1/012040 Retrieved from www.scopus.com
- Mohan, M., & Joseph, M. V. (2019). A comparative study of different metaheuristic optimization algorithms using standard test functions. Paper presented at the AIP Conference Proceedings, , 2134 doi:10.1063/1.5120226 Retrieved from www.scopus.com
- Nezamoddini, N., & Gholami, A. (2019). Integrated genetic algorithm and artificial neural network. Paper presented at the Proceedings - 22nd IEEE International Conference on Computational Science and Engineering and 17th IEEE International Conference on Embedded and Ubiquitous Computing, CSE/EUC 2019, 260-262. doi:10.1109/CSE/EUC.2019.00057 Retrieved from www.scopus.com
- Hussain, K., Mohd Salleh, M. N., Prasetyo, Y. A., & Cheng, S. (2018). Personal best cuckoo search algorithm for global optimization. International Journal on Advanced Science, Engineering and Information Technology, 8(4), 1209-1217. doi:10.18517/ijaseit.8.4.5009
- Altwlkany K, Konjicija S. Playground Algorithm as a New Meta-heuristic Optimization Algorithm. 2019 XXVII International Conference on Information, Communication and Automation Technologies (ICAT) [Internet]. IEEE; 2019 Oct; Available from: http://dx.doi.org/10.1109/icat47117.2019.8938959
- Saire JEC, Singh A. A Comparative Analysis of Quantum Inspired Evolutionary Algorithm with Differential Evolution, Evolutionary Strategy and Particle Swarm Optimization. 2019 IEEE Latin American Conference on Computational Intelligence (LA-CCI) [Internet]. IEEE; 2019 Nov; Available from: http://dx.doi.org/10.1109/la-cci47412.2019.9037039
- Demidova L, Gorchakov A. The research and development of the hybrid algorithm based on the collective behavior of Fish schools and the classical optimization methods. IOP Conference Series: Materials Science and Engineering [Internet]. IOP Publishing; 2020 Jan 29;734:012090. Available from: http://dx.doi.org/10.1088/1757-899x/734/1/012090
- Chou J-S, Nguyen N-M. FBI inspired meta-optimization. Applied Soft Computing [Internet]. Elsevier BV; 2020 Aug;93:106339. Available from: http://dx.doi.org/10.1016/j.asoc.2020.106339
30>> M. Jamshidi, H. Bazargan, A. Abdulla Shaltooki, & A. Mohammad Darwesh "A Hybrid Key Pre-Distribution Scheme for Securing Communications in Wireless Sensor Networks," JOIV : International Journal on Informatics Visualization, vol. 3, no. 1, , pp. 41 - 46, Jan. 2019. https://doi.org/10.30630/joiv.3.1.203
Cited By (Scopus Documents) :
- Asha, K. R., & Supriya, M. C. (2019). Energy efficient and secured key based management in area monitor by wsn. International Journal of Innovative Technology and Exploring Engineering, 8(10 Special Issue), 142-151. doi:10.35940/ijitee.J1027.08810S19
- Jamshidi, M., Esnaashari, M., Darwesh, A. M., & Meybodi, M. R. (2019). Using time-location tags and watchdog nodes to defend against node replication attack in mobile wireless sensor networks. International Journal of Wireless Information Networks, doi:10.1007/s10776-019-00469-0
- Rahim R, Rosid MA, Fitrani AS, GS AD, Ginantra NLWSR. Enhancement three-pass protocol security with combination caesar cipher and vigenere cipher. Journal of Physics: Conference Series [Internet]. IOP Publishing; 2019 Dec;1402:066045. Available from: http://dx.doi.org/10.1088/1742-6596/1402/6/066045
- Rahim R, Sumarno S, Multazam MT, Thamrin S, Sumantri SH. Combination Base64 and GOST algorithm for security process. Journal of Physics: Conference Series [Internet]. IOP Publishing; 2019 Dec;1402:066054. Available from: http://dx.doi.org/10.1088/1742-6596/1402/6/066054
- Zeng B, Yao L. Design of a Secure Communication Scheme using Channel Shifting in Wireless Sensor Networks. IOP Conference Series: Earth and Environmental Science [Internet]. IOP Publishing; 2020 Jan 17;428:012026. Available from: http://dx.doi.org/10.1088/1755-1315/428/1/012026
31>> J. George, & M. Nazeh "Challenges Faced by CIOs in cloud and IoT based organizations- A Study on IT and Business Leaders," JOIV : International Journal on Informatics Visualization, vol. 3, no. 1, , pp. 18 - 34, Jan. 2019. https://doi.org/10.30630/joiv.3.1.213
Cited By (Scopus Documents) :
32>> M. Ibraigheeth, & S. Fadzli "Core Factors for Software Projects Success," JOIV : International Journal on Informatics Visualization, vol. 3, no. 1, , pp. 69 - 74, Jan. 2019. https://doi.org/10.30630/joiv.3.1.217
Cited By (Scopus Documents) :
33>> M. Shodiq, D. Kusuma, M. Rifqi, A. Barakbah, & T. Harsono "Neural Network for Earthquake Prediction Based on Automatic Clustering in Indonesia," JOIV : International Journal on Informatics Visualization, vol. 2, no. 1, , pp. 37 - 43, Feb. 2018. https://doi.org/10.30630/joiv.2.1.106
Cited By (Scopus Documents) :
- Barakbah, A. R., Harsono, T., & Sudarsono, A. (2019). Automatic cluster-oriented seismicity prediction analysis of earthquake data distribution in indonesia. International Journal on Advanced Science, Engineering and Information Technology, 9(2), 587-593. doi:10.18517/ijaseit.9.2.7269
- Obornev, E. A., Shimelevich, M. I., Obornev, I. E., & Nikitin, A. A. (2018). Image identification methods and neural network technologies in 2D/3D geoelectric data interpretation. Gornyi Zhurnal, (11), 34-38. doi:10.17580/gzh.2018.11.05
- Lee, T., Choi, W., Sohn, J., Moon, K., Byeon, S., Lee, W., & Jung, S. (2018). Spatial clustering based meteorological fields construction for regional vulnerability assessment. International Journal on Advanced Science, Engineering and Information Technology, 8(4-2), 1686-1691. Retrieved from www.scopus.com
34>> D. Lashayo, & M. Md Johar "Instructor Adoption of E-learning Systems in Tanzania’s Universities: A Proposed Multi-Factors Adoption Model (MFAM11)," JOIV : International Journal on Informatics Visualization, vol. 2, no. 2, , pp. 76 - 80, Mar. 2018. https://doi.org/10.30630/joiv.2.2.117
Cited By (Scopus Documents) :
- Mensah, I. K., Tianyu, Z., Zeng, G., & Chuanyong, L. (2019). Determinants of the continued intention of college students in china to use DiDi mobile car-sharing services. SAGE Open, 9(4) doi:10.1177/2158244019893697
- Rahim R, Dijaya R, Multazam MT, GS AD, Sudrajat D. Puzzle game solving with breadth first search algorithm. Journal of Physics: Conference Series [Internet]. IOP Publishing; 2019 Dec;1402:066040. Available from: http://dx.doi.org/10.1088/1742-6596/1402/6/066040
35>> C. Zheng Wei, & C. Wen "Blockchain-Based Electronic Voting Protocol," JOIV : International Journal on Informatics Visualization, vol. 2, no. 4-2, , pp. 336 - 341, Sep. 2018. https://doi.org/10.30630/joiv.2.4-2.174
Cited By (Scopus Documents) :
- Shanmugasundaram, G., Kalaimathy, A., Johnvee, M., & Pavithra, S. (2019). Perspective analysis of digital voting systems. Paper presented at the 2019 IEEE International Conference on System, Computation, Automation and Networking, ICSCAN 2019, doi:10.1109/ICSCAN.2019.8878849 Retrieved from www.scopus.com
- Arun, V., Dutta, A., Rajeev, S., & Mathew, R. V. (2019). E-voting using a decentralized ethereum application. International Journal of Engineering and Advanced Technology, 8(4), 830-833. Retrieved from www.scopus.com
36>> Andrizal, R. Chadry, & A. Suryani "Embedded System Using Field Programmable Gate Array (FPGA) myRIO and LabVIEW Programming to Obtain Data Patern Emission of Car Engine Combustion Categories," JOIV : International Journal on Informatics Visualization, vol. 2, no. 2, , pp. 56 - 62, Mar. 2018. https://doi.org/10.30630/joiv.2.2.50
Cited By (Scopus Documents) :
- Giardino, D., Matta, M., & Spanò, S. (2019). An automatic AW-SOM VHDL IP-core generator. International Journal on Advanced Science, Engineering and Information Technology, 9(4), 1136-1141. Retrieved from www.scopus.com
- Cho, S. -. (2018). A program optimization method for embedded software developed using open sources. International Journal on Advanced Science, Engineering and Information Technology, 8(4-2), 1692-1697. Retrieved from www.scopus.com
37>> M. Jamshidi, M. Ranjbari, M. Esnaashari, N. Nasih Qader, & M. Meybodi "Sybil Node Detection in Mobile Wireless Sensor Networks Using Observer Nodes," JOIV : International Journal on Informatics Visualization, vol. 2, no. 3, , pp. 159 -165, May. 2018. https://doi.org/10.30630/joiv.2.3.131
Cited By (Scopus Documents) :
- Jamshidi, M., Esnaashari, M., Darwesh, A. M., & Meybodi, M. R. (2019). Detecting sybil nodes in stationary wireless sensor networks using learning automaton and client puzzles. IET Communications, 13(13), 1988-1997. doi:10.1049/iet-com.2018.6036
- Jamshidi, M., Zangeneh, E., Esnaashari, M., Darwesh, A. M., & Meybodi, M. R. (2019). A novel model of sybil attack in cluster-based wireless sensor networks and propose a distributed algorithm to defend it. Wireless Personal Communications, 105(1), 145-173. doi:10.1007/s11277-018-6107-5
- Jamshidi, M., Ranjbari, M., Esnaashari, M., Darwesh, A. M., & Meybodi, M. R. (2019). A new algorithm to defend against sybil attack in staticwireless sensor networks using mobile observer sensor nodes. Ad-Hoc and Sensor Wireless Networks, 43(3-4), 213-238. Retrieved from www.scopus.com
- Jamshidi, M., Poor, S. S. A., Qader, N. N., Esnaashari, M., & Meybodi, M. R. (2019). A lightweight algorithm against replica node attack in mobile wireless sensor networks using learning agents. IEIE Transactions on Smart Processing and Computing, 8(1), 58-70. doi:10.5573/IEIESPC.2019.8.1.058
- Jamshidi, M., Darwesh, A. M., Lorenc, A., Ranjbari, M., & Meybodi, M. R. (2018). A precise algorithm for detecting malicious sybil nodes in mobile wireless sensor networks. IEIE Transactions on Smart Processing and Computing, 7(6), 457-466. doi:10.5573/IEIESPC.2018.7.6.457
- Mohammed HS. Determining Location of Wormhole Attacks in Wireless Sensor Networks using Patrol Nodes. IJAST [Internet]. 2019Sep.27; 28(1):306 -317. Available from: http://sersc.org/journals/index.php/IJAST/article/view/396
- Jamshidi M, Poor SSA, Arghavani A, Esnaashari M, Shaltooki AA, Meybodi MR. A simple, lightweight, and precise algorithm to defend against replica node attacks in mobile wireless networks using neighboring information. Ad Hoc Networks [Internet]. Elsevier BV; 2020 Apr;100:102081. Available from: http://dx.doi.org/10.1016/j.adhoc.2020.102081
38>> T. Sundara, I. Gaputra, & S. Aulia "Study on Blockchain Visualization," JOIV : International Journal on Informatics Visualization, vol. 1, no. 3, , pp. 76-82, Jun. 2017. https://doi.org/10.30630/joiv.1.3.23
Cited By (Scopus Documents) :
- Shin, H. -., Kim, D., Maeng, S., Lee, K., & Ju, H. (2019). Web server for analysis and visualization of bitcoin data. Paper presented at the 2019 20th Asia-Pacific Network Operations and Management Symposium: Management in a Cyber-Physical World, APNOMS 2019, doi:10.23919/APNOMS.2019.8892943 Retrieved from www.scopus.com
- Coghill, J. G. (2018). Blockchain and its implications for libraries. Journal of Electronic Resources in Medical Libraries, 15(2), 66-70. doi:10.1080/15424065.2018.1483218
39>> C. Thirumalai, & R. Koppuravuri "Bike Sharing Prediction using Deep Neural Networks," JOIV : International Journal on Informatics Visualization, vol. 1, no. 3, , pp. 83-87, Jun. 2017. https://doi.org/10.30630/joiv.1.3.30
Cited By (Scopus Documents) :
- Yang, H., Zhang, X., Zhong, L., Li, S., Zhang, X., & Hu, J. (2019). Short-term demand forecasting for bike sharing system based on machine learning. Paper presented at the ICTIS 2019 - 5th International Conference on Transportation Information and Safety, 1295-1300. doi:10.1109/ICTIS.2019.8883732 Retrieved from www.scopus.com
- Saritha, K., & Abraham, S. (2019). Accuracy evaluation of prediction using supervised learning techniques. Paper presented at the ACM International Conference Proceeding Series, doi:10.1145/3339311.3339337 Retrieved from www.scopus.com
- Zhou Q, Gu J-J, Ling C, Li W-B, Zhuang Y, Wang J. Exploiting Multiple Correlations Among Urban Regions for Crowd Flow Prediction. Journal of Computer Science and Technology [Internet]. Springer Science and Business Media LLC; 2020 Mar;35(2):338–52. Available from: http://dx.doi.org/10.1007/s11390-020-9970-y
40>> S. Palaniappan, A. Mustapha, C. Mohd Foozy, & R. Atan "Customer Profiling using Classification Approach for Bank Telemarketing," JOIV : International Journal on Informatics Visualization, vol. 1, no. 4-2, , pp. 214 - 217, Nov. 2017. https://doi.org/10.30630/joiv.1.4-2.68
Cited By (Scopus Documents) :
- Abu-Srhan, A., Al zghoul, S., Alhammad, B., & Al-Sayyed, R. (2019). Visualization and analysis in bank direct marketing prediction. International Journal of Advanced Computer Science and Applications, 10(7), 651-657. Retrieved from www.scopus.com
- Zeinulla, E., Bekbayeva, K., & Yazici, A. (2018). Comparative study of the classification models for prediction of bank telemarketing. Paper presented at the IEEE 12th International Conference on Application of Information and Communication Technologies, AICT 2018 - Proceedings, doi:10.1109/ICAICT.2018.8747086 Retrieved from www.scopus.com
- Wibowo AH, Oesman TI. The comparative analysis on the accuracy of k-NN, Naive Bayes, and Decision Tree Algorithms in predicting crimes and criminal actions in Sleman Regency. Journal of Physics: Conference Series [Internet]. IOP Publishing; 2020 Feb;1450:012076. Available from: http://dx.doi.org/10.1088/1742-6596/1450/1/012076
41>> A. Ghali, S. Jamel, K. Mohamad, N. Yakub, & M. Mat Deris "A Review of Iris Recognition Algorithms," JOIV : International Journal on Informatics Visualization, vol. 1, no. 4-2, , pp. 175 - 178, Nov. 2017. https://doi.org/10.30630/joiv.1.4-2.62
Cited By (Scopus Documents) :
42>> A. Eldow, M. Shakir, M. Abdullah, & S. Malik "Using Information Communication Technology as a Teaching tool in Sudanese Governmental Universities of Khartoum State," JOIV : International Journal on Informatics Visualization, vol. 1, no. 4, , pp. 150 -156, Dec 2017. https://doi.org/10.30630/joiv.1.4.55
Cited By (Scopus Documents) :
- Malik, S. I., Shakir, M., Eldow, A., & Ashfaque, M. W. (2019). Promoting algorithmic thinking in an introductory programming course. International Journal of Emerging Technologies in Learning, 14(1), 84-94. doi:10.3991/ijet.v14i01.9061
- Tawafak, R. M., Romli, A. M., & Alsinani, M. J. (2019). Student assessment feedback effectiveness model for enhancing teaching method and developing academic performance. International Journal of Information and Communication Technology Education, 15(3), 75-88. doi:10.4018/IJICTE.2019070106
- Al Farsi, G., Jabbar, J., & Al Sinani, M. (2018). Implementing a mobile application news tool for disseminating messages and events of AlBuraimi university college. International Journal of Interactive Mobile Technologies, 12(7), 129-138. doi:10.3991/ijim.v12i7.9484
- Malik, S. I., & Al-Emran, M. (2018). Social factors influence on career choices for female computer science students. International Journal of Emerging Technologies in Learning, 13(5), 56-70. doi:10.3991/IJET.V13I05.8231
43>> C. Amali, & B. Ramachandran "Enabling Key Technologies and Emerging Research Challenges Ahead of 5G Networks: An Extensive Survey," JOIV : International Journal on Informatics Visualization, vol. 2, no. 3, , pp. 133 - 146, Apr. 2018. https://doi.org/10.30630/joiv.2.3.128
Cited By (Scopus Documents) :
44>> M. Mohd Yunus, M. Zainulariff Brohan, N. Nawi, E. Mat Surin, N. Azwani Md Najib, & C. Liang "Review of SQL Injection : Problems and Prevention," JOIV : International Journal on Informatics Visualization, vol. 2, no. 3-2, , pp. 215 - 219, Jun. 2018. https://doi.org/10.30630/joiv.2.3-2.144
Cited By (Scopus Documents) :
- Adamu J, Hamzah R, Rosli MM. Security issues and framework of electronic medical record: A review. Bulletin of Electrical Engineering and Informatics [Internet]. Institute of Advanced Engineering and Science; 2020 Apr 1;9(2). Available from: http://dx.doi.org/10.11591/eei.v9i2.2064
- KARA I, AYDOS M. Detection and Analysis of Attacks Against Web Services by the SQL Injection Method. 2019 3rd International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT) [Internet]. IEEE; 2019 Oct; Available from: http://dx.doi.org/10.1109/ismsit.2019.8932755
45>> L. Han Keat, & C. Wen "Smart Indoor Home Surveillance Monitoring System Using Raspberry Pi," JOIV : International Journal on Informatics Visualization, vol. 2, no. 4-2, , pp. 299 - 308, Sep. 2018. https://doi.org/10.30630/joiv.2.4-2.172
Cited By (Scopus Documents) :
- Patel J, Anand S, Luthra R. Image-Based Smart Surveillance and Remote Door Lock Switching System for Homes. Procedia Computer Science [Internet]. Elsevier BV; 2019;165:624–30. Available from: http://dx.doi.org/10.1016/j.procs.2020.01.056
- Winarno E, Hartono H, Erliana CI, Fithra H. Designing Red Eye Reduction Software with Intensity Color Checking Technique. Journal of Physics: Conference Series [Internet]. IOP Publishing; 2019 Dec;1364:012030. Available from: http://dx.doi.org/10.1088/1742-6596/1364/1/012030
46>> D. Elango, R. Vongurai, & K. Srifah "The Factors Influencing Intention to Study Via Online Education: The Case Study of People In Bangkok, Thailand," JOIV : International Journal on Informatics Visualization, vol. 2, no. 4, , pp. 245 - 251, Jul. 2018. https://doi.org/10.30630/joiv.2.4.150
Cited By (Scopus Documents) :
47>> O. Bourkoukou, & O. Achbarou "Weighting based approach for learning resources recommendations," JOIV : International Journal on Informatics Visualization, vol. 2, no. 3, , pp. 104 - 109, Apr. 2018. https://doi.org/10.30630/joiv.2.3.124
Cited By (Scopus Documents) :
48>> Y. Shuen, N. Arbaiy, & Y. Yah Jusoh "Fertilizer Information System for Banana Plantation," JOIV : International Journal on Informatics Visualization, vol. 1, no. 4-2, , pp. 204 - 208, Nov. 2017. https://doi.org/10.30630/joiv.1.4-2.69
Cited By (Scopus Documents) :
- Winarno E, Hartono H, Erliana CI, Fithra H. Designing Red Eye Reduction Software with Intensity Color Checking Technique. Journal of Physics: Conference Series [Internet]. IOP Publishing; 2019 Dec;1364:012030. Available from: http://dx.doi.org/10.1088/1742-6596/1364/1/012030
- Nopriadi, Iskandar A, Utami L, Yandri O. Utility Software Design to Comprehend The Cryptography Cast-128 Method. Journal of Physics: Conference Series [Internet]. IOP Publishing; 2019 Dec;1364:012049. Available from: http://dx.doi.org/10.1088/1742-6596/1364/1/012049
49>> H. Muhasin, R. Atan, M. A.Jabar, S. Abdullah, & S. Kasim "Multilayered Framework to Enhance Management Information Systems Decision on Sensitive Data in Cloud Computing Environment," JOIV : International Journal on Informatics Visualization, vol. 1, no. 4-2, , pp. 179 - 183, Nov. 2017. https://doi.org/10.30630/joiv.1.4-2.83
Cited By (Scopus Documents) :
- Nopriadi, Iskandar A, Utami L, Yandri O. Utility Software Design to Comprehend The Cryptography Cast-128 Method. Journal of Physics: Conference Series [Internet]. IOP Publishing; 2019 Dec;1364:012049. Available from: http://dx.doi.org/10.1088/1742-6596/1364/1/012049
- Dikananda AR, Daengs GS A, Abdullah D, Erliana CI. Chess Game Software Design. Journal of Physics: Conference Series [Internet]. IOP Publishing; 2019 Dec;1364:012023. Available from: http://dx.doi.org/10.1088/1742-6596/1364/1/012023
50>> J. Al-Azzeh, B. Zahran, Z. Alqadi, B. Ayyoub, & M. Mesleh "A Novel Based On Image Blocking Method To Encrypt-Decrypt Color," JOIV : International Journal on Informatics Visualization, vol. 3, no. 1, , pp. 86 - 93, Jan. 2019. https://doi.org/10.30630/joiv.3.1.210
Cited By (Scopus Documents) :
- Rahim R, Rosid MA, Fitrani AS, GS AD, Ginantra NLWSR. Enhancement three-pass protocol security with combination caesar cipher and vigenere cipher. Journal of Physics: Conference Series [Internet]. IOP Publishing; 2019 Dec;1402:066045. Available from: http://dx.doi.org/10.1088/1742-6596/1402/6/066045
- Rahim R, Sumarno S, Multazam MT, Thamrin S, Sumantri SH. Combination Base64 and GOST algorithm for security process. Journal of Physics: Conference Series [Internet]. IOP Publishing; 2019 Dec;1402:066054. Available from: http://dx.doi.org/10.1088/1742-6596/1402/6/066054
- Rasras RJ. Developing new Multilevel security algorithm for data encryption-decryption (MLS_ED). International Journal of Advanced Trends in Computer Science and Engineering [Internet]. The World Academy of Research in Science and Engineering; 2019 Dec 15;8(6):3228–35. Available from: http://dx.doi.org/10.30534/ijatcse/2019/90862019
51>> E. Adwan, & A. Al-Soufi "A Review of ICT Applications in Construction," JOIV : International Journal on Informatics Visualization, vol. 2, no. 4, , pp. 279 - 285, Aug. 2018. https://doi.org/10.30630/joiv.2.4.163
Cited By (Scopus Documents) :
52>> J. Efendi, M. Zul, & W. Yunanto "Real Time Face Recognition using Eigenface and Viola-Jones Face Detector," JOIV : International Journal on Informatics Visualization, vol. 1, no. 1, , pp. 16-22, Mar. 2017. https://doi.org/10.30630/joiv.1.1.15
Cited By (Scopus Documents) :
53>> H. Kamil, F. Akbar, & M. Andriani "Design of Location-Based Waste Collecting on Enviro Andalas Waste Bank," JOIV : International Journal on Informatics Visualization, vol. 3, no. 1, , pp. 35 - 40, Jan. 2019. https://doi.org/10.30630/joiv.3.1.212
Cited By (Scopus Documents) :