cover
Contact Name
Agis Abhi Rafdhi
Contact Email
agis@email.unikom.ac.id
Phone
+62222504119
Journal Mail Official
injuratech@email.unikom.ac.id
Editorial Address
Jl. Dipati Ukur No.112-116, Lebakgede, Kecamatan Coblong, Kota Bandung, Jawa Barat 40132
Location
Kota bandung,
Jawa barat
INDONESIA
International Journal of Research and Applied Technology (INJURATECH)
INJURATECH cover all topics under the fields of Computer Science, Information system, and Applied Technology. Scope: Computer Based Education Information System Database Systems E-commerce and E-governance Data mining Decision Support System Management Information System Social Media Analytic Data visualization Cloud computing platforms Distributed file systems and databases Big data technologies Data capture and storage Computer Architecture and Embedded Systems Geographic information system (GIS) Remote Sensing Software Engineering Internet and Web Applications Mobile Computing Hardware and physical security Mobile Computing Security management and policies Block chain Technology
Articles 210 Documents
Machine Learning Approaches for Heart Disease Detection: A Comprehensive Review A. Taher, Hanan; M. Abdulazeez, Adnan
International Journal of Research and Applied Technology (INJURATECH) Vol. 3 No. 2 (2023): International Journal of Research and Applied Technology (INJURATECH)
Publisher : Universitas Komputer Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.34010/injuratech.v3i2.12052

Abstract

This paper presents a comprehensive review of the application of machine learning algorithms in the early detection of heart disease. Heart disease remains a leading global health concern, necessitating efficient and accurate diagnostic methods. Machine learning has emerged as a promising approach, offering the potential to enhance diagnostic accuracy and reduce the time required for assessments. This review begins by elucidating the fundamentals of machine learning and provides concise explanations of the most prevalent algorithms employed in heart disease detection. It subsequently examines noteworthy research efforts that have harnessed machine learning techniques for heart disease diagnosis. A detailed tabular comparison of these studies is also presented, highlighting the strengths and weaknesses of various algorithms and methodologies. This survey underscores the significant strides made in leveraging machine learning for early heart disease detection and emphasizes the ongoing need for further research to enhance its clinical applicability and efficacy.
Harnessing Machine Learning for Crypto-Currency Price Prediction: A Review Ali, Zeravan Arif; Abdulazeez, Adnan M
International Journal of Research and Applied Technology (INJURATECH) Vol. 4 No. 1 (2024): International Journal of Research and Applied Technology (INJURATECH)
Publisher : Universitas Komputer Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Despite their recent inception, cryptocurrencies have become globally recognized for their dispersal, diversity, and high market capitalization. This volatility developed into a challenge for investors looking to predict price movements. Thus, it has become an attractive investment opportunity. To increase prediction accuracy, researchers integrate machine learning algorithms with technical indicators. In this review, a systematic comparison has been employed to identify efficient algorithms, and researchers have employed statistical measures to make short- and long-term forecasts of decentralized money prices. Moreover, the paper highlights the results of researchers based on machine learning and deep learning methodologies on multiple types of cryptocurrencies like Bitcoin, Ethereum, Monero, etc. Lastly, the work emphasizes the limitations, gaps, and challenges facing researchers to take advantage of existing literature for future works.
Facial Emotion Recognition Based on Deep Learning: A Review Ali, Nabeel N; Abdulazeez, Adnan M
International Journal of Research and Applied Technology (INJURATECH) Vol. 4 No. 1 (2024): International Journal of Research and Applied Technology (INJURATECH)
Publisher : Universitas Komputer Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Numerous domains, including safety, health, and human-machine interfaces, have garnered significant attention from researchers. Within this field, there is a notable interest in developing methodologies for interpreting and encoding facial expressions, as well as extracting pertinent features for more accurate computer-based predictions. Leveraging the remarkable advancements in deep learning, various architectural approaches are explored to enhance performance outcomes. The primary objective of this paper is to conduct an examination of recent research endeavors pertaining to automatic facial emotion recognition (FER) through the utilization of deep learning techniques. We emphasize the treatment of these contributions, elucidate the architectural frameworks employed, and outline the databases that have been utilized. Additionally, we present a comprehensive assessment of the progress achieved by comparing the methodologies proposed and the corresponding results obtained. This paper aims to provide valuable insights and guidance to researchers in this field by reviewing recent developments and suggesting avenues for further enhancements
Cybernetic Deception: Unraveling the Layers of Email Phishing Threats Zangana, Hewa Majeed; Mohammed, Ayaz Khalid; Sallow, Amira Bibo; Sallow, Zina Bibo
International Journal of Research and Applied Technology (INJURATECH) Vol. 4 No. 1 (2024): International Journal of Research and Applied Technology (INJURATECH)
Publisher : Universitas Komputer Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

E-mail phishing, a tireless and versatile cybersecurity risk, requires a intensive examination to fortify organizational resistances. This broad survey dives into the multifaceted measurements of e-mail phishing, including mental control strategies, mechanical complexities, and real-world experiences determined from assorted case considers. The investigation of location and anticipation procedures covers a extend of commitments, tending to half breed machine learning approaches, the significance of client instruction, and the part of administrative compliance. These procedures give a significant system for organizations pointing to improve their flexibility against the energetic scene of phishing strategies. The theoretical underscores the administrative landscape's significant part in forming cybersecurity hones, advertising a organized establishment for organizations to adjust with legitimate prerequisites. Expecting future patterns and challenges, such as the integration of characteristic dialect preparing procedures and the complexities of cloud-based phishing assaults, gets to be basic for maintained cyber versatility. In conclusion, this paper serves as a comprehensive direct, enabling people and organizations with the information and methodologies required to explore the complex scene of e-mail phishing dangers. It recognizes the energetic nature of the danger scene, highlighting the progressing travel in combating computerized duplicity and invigorating preparation against the ever-evolving strategies of phishing foes.
An Analysis of Requirement Engineering and Techniques: A Literature Review Zakaria, Fariz; Utami, Ema
International Journal of Research and Applied Technology (INJURATECH) Vol. 4 No. 1 (2024): International Journal of Research and Applied Technology (INJURATECH)
Publisher : Universitas Komputer Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.34010/injuratech.v4i1.13731

Abstract

This research explores the essentiality of software requirements engineering in cycles software development. The focus lies on three main techniques, namely Functional Requirement, Non-Functional Requirement, Viewpoint Orientation Requirement Definition (VORD), and analysis through USECASE (Use Case Diagram and Use Case Scenario). Through a review systematic literature, ten relevant articles have been comprehensively reviewed in order to understand these techniques. The research results show that functional and non-functional needs have a role central to software development. Functional requirements describe what is should be carried out by the system, while non-functional requirements include aspects such as performance and security aspects. The VORD approach is proven to be efficient in understanding various angles views involved in system requirements, through the steps of identification, structure, documentation, and system point of view mapping. Besides that, the USECASE method helps describe user interactions with the internal system real-world situations, providing deep insight into user needs. This research make significant contributions to understanding the nature of software requirements engineering, and provide an important foundation for future research and practice
Designing Information Systems for Small and Medium Enterprises Based on Application Rachmanto, Adi; Gunawan, A; Setiawan, S; Sofiane, H
International Journal of Research and Applied Technology (INJURATECH) Vol. 4 No. 1 (2024): International Journal of Research and Applied Technology (INJURATECH)
Publisher : Universitas Komputer Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Small and medium enterprises are a major factor in playing a role in the era of globalization to advance the country's economy. On the other hand, there are still many small and medium enterprises that still apply information systems manually, which is an obstacle in the world of business competition. Therefore, the need for a transaction application that facilitates sales activities, which are still manually digital. So the purpose of this study is to design transaction applications for small and medium enterprises with the latest information systems. To support this research, researchers used a descriptive method approach with a practical and applicable approach by collecting data using literature studies and developing information systems using a prototype method with an object-based approach. The results show that this design has an impact on changes in business performance. because in this application provides the latest features and is easy to operate by small and medium businesses. Some of the features include: Login Menu, Main Menu, Item Menu and Sales Menu. Basically, with some far better benefits provided, many small business operators are reluctant to use them for reasons related to equipment costs. It can be concluded that in designing an application well, the resulting application will run well. This application is useful for reducing the occurrence of small errors in transactions
Blockchain Technology as a Security Media for E-Commerce Transaction Process Soegoto, Eddy Soeryanto; Elfiyah, E; Adilah, N; Kamil, N H
International Journal of Research and Applied Technology (INJURATECH) Vol. 4 No. 1 (2024): International Journal of Research and Applied Technology (INJURATECH)
Publisher : Universitas Komputer Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.34010/injuratech.v4i1.13839

Abstract

The purpose of this study is to design the application of blockchain technology in an e-commerce service. The method used in this research was qualitative descriptive analysis and supported by literature studies. The results show that applying this technology can reduce the potential loss of tax fraud in VAT reporting. Blockchain technology implementation is done to solve fraud, limit contact between purchases and sellers, and misuse personal data by increasing security and transparency by applying cryptocurrency in payments. This technology is also reliable to solve the problems of taxation and improve the efficiency of tax digitization. So it can be concluded that in the future, blockchain technology is one of the security systems for making e-commerce transactions and payment systems that are easier, more efficient, and well-documented so that can reduce fraud in VAT reporting by e-commerce.
Determination of Maintenance Method for Turbine Pump Engine Based on Markov Analysis Anthara, I Made Aryantha; Andriani, Diana; Nugraha, M L; Akbar, A
International Journal of Research and Applied Technology (INJURATECH) Vol. 4 No. 1 (2024): International Journal of Research and Applied Technology (INJURATECH)
Publisher : Universitas Komputer Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.34010/injuratech.v4i1.13847

Abstract

The purpose of this research is to determine the type of maintenance method that can be applied to the C1107 engine in the company. The C1107 engine is a turbine pump machine used in the manufacture of fertilizers. The main problem discussed in this study is the frequency of damage that occurs in the C1107 engine is quite large, and this will impact the maintenance costs incurred by the company. The types of damage that occurred were categorized into four states, namely good condition, minor, moderate, and high damage. The method used in this research is the Markov analysis method, where, in this method, the value of the transition probability to the steady-state condition will be sought from the transition probability of the failure condition of the CII07 engine used by the company. From the results of the research conducted, it was found that the steady-state status was good, the damage was minor, moderate, and severe, respectively by 11.50, 61.40, 18.70, and 8.40%. The types of maintenance that can be applied are the type of repair maintenance in severe damage conditions and the type of preventive maintenance in moderate damage conditions with a total cost of Rp. 25,042,826. The benefit obtained in this research is to determine the best type of C1107 engine maintenance for the company.
Geographic Information System for Spatial Utilization Licensing of Tabalong Regency Based on Web and Mobile Applications Radliya, Nizar Rabbi; Wibawa, Julian Chandra; Rabbi, A R
International Journal of Research and Applied Technology (INJURATECH) Vol. 4 No. 1 (2024): International Journal of Research and Applied Technology (INJURATECH)
Publisher : Universitas Komputer Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.34010/injuratech.v4i1.13848

Abstract

The management of spatial use permits aims to prevent negative impacts on the environment due to spatial use that is not in accordance with the regulations in the regional spatial plan. Currently, in Tabalong Regency, several violations of aaaaa aaa aaspatial use do not match its designation. In order to minimize the occurrence of violations of spatial planning, it is necessary to strengthen control over spatial use through the development of information systems. This study aims to adopt the use of information and communication technology for space utilization permits in the form of implementing the geographic information system concept using the web and mobile-based application media. This study used a qualitative approach through descriptive methods to explore the urgency of geographic information systems as an instrument of utilization control. The results of the study show that the information system application developed is a means for the community, business actors, investors who plan to submit applications related to space utilization permits. This research also produces information system products that can realize transparency of spatial information and control processes of space utilization that can minimize the potential for deviation from procedures and results of licenses issued.
Website Based Draft Application Soegoto, Yudistira; Soeikromo, D; Rohman, H S; Setiadi, F A; Pambudi, L
International Journal of Research and Applied Technology (INJURATECH) Vol. 4 No. 1 (2024): International Journal of Research and Applied Technology (INJURATECH)
Publisher : Universitas Komputer Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.34010/injuratech.v4i1.13849

Abstract

The development of product sales through the internet has spread in Indonesia, even well known. There are many conveniences in shopping such as various types of products and services offered. The website application designed is expected to help the business of food products in promoting its business. With the increasing use of smartphones, it can facilitate ordering food products through the website. This research used a quantitative method where data collection was taken from the study and took some internet references. This design uses a case diagram, and the programming language used PHP with Laravel framework and MySQL as a database. The design of this application creation will discuss several parts in the application, including the login view, the appearance of the main page of the application, the appearance of the order form, the payment view, and the appearance of feedback. Therefore, this analysis is expected to produce an online buying and selling website with various features that can help sell food products