cover
Contact Name
Tri A. Sundara
Contact Email
tri.sundara@stmikindonesia.ac.id
Phone
+628116606456
Journal Mail Official
ijcs@stmikindonesia.ac.id
Editorial Address
Jalan Khatib Sulaiman Dalam 1, Padang, Indonesia
Location
Kota padang,
Sumatera barat
INDONESIA
The Indonesian Journal of Computer Science
Published by STMIK Indonesia Padang
ISSN : 25497286     EISSN : 25497286     DOI : https://doi.org/10.33022
The Indonesian Journal of Computer Science (IJCS) is a bimonthly peer-reviewed journal published by AI Society and STMIK Indonesia. IJCS editions will be published at the end of February, April, June, August, October and December. The scope of IJCS includes general computer science, information system, information technology, artificial intelligence, big data, industrial revolution 4.0, and general engineering. The articles will be published in English and Bahasa Indonesia.
Articles 1,127 Documents
Cryptocurrencies Price Estimation Using Deep Learning Hybride Model of LSTM-GRU Auliyah, Ulul Azmiati
The Indonesian Journal of Computer Science Vol. 13 No. 4 (2024): The Indonesian Journal of Computer Science (IJCS)
Publisher : AI Society & STMIK Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33022/ijcs.v13i4.4161

Abstract

One of the financial assets in currency exchange is now cryptocurrency. The public is drawn to cryptocurrency trading because it is considered a lucrative form of investing. For cryptocurrency investors to maximize their earnings, accurate price forecasting is crucial. As price forecasting involves time series analysis, a hybrid deep learning model is suggested to project cryptocurrency prices in the future. Long Short-Term Memory and Gated Recurrent Unit (LSTM-GRU) networks are integrated into the hybrid model. Three cryptocurrency datasets are evaluated using the suggested hybrid model: Ethereum, Ripple, and Bitcoin. According to experimental results, the suggested LSTM-GRU model may provide the lowest MSE and RMSE values on the Bitcoin dataset (0.0611 and 0.2472), the Ethereum dataset (0.0369 and 0.19222), and the Ripple dataset (0.0006 and 0.0247).
Smart Helmet untuk Monitoring Pekerja Konstruksi Menggunakan ESP32 dan LoRa berbasis IoT Supriyanto, Hadi; Rokhim, Ismail; Eliezer, Vincent
The Indonesian Journal of Computer Science Vol. 13 No. 4 (2024): The Indonesian Journal of Computer Science (IJCS)
Publisher : AI Society & STMIK Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33022/ijcs.v13i4.4162

Abstract

Job safety in the construction sector in Indonesia is a pressing issue, with accident rates still high despite conventional efforts to improve them. This research aims to overcome this issue by utilizing the Internet of Things (IoT) through Smart Helmets. The Smart Helmet is equipped with an Inertial Measurement Unit (IMU) sensor to detect falls and monitor worker orientation and movement in realtime. This system uses MongoDB for data storage and Real-Time Locating System (RTLS) with ESP32 and HELTEC LoRa32 V2 for signal transmission. The MPU9250 9DOF sensor is used to obtain data from the IMU, while Sensor Fusion and Kalman Filter are used to increase the accuracy of sensor data measurements. The research design research method is applied through the needs identification, design, implementation and evaluation stages. The results of this research are able to monitor workers' movements and orientation and detect work accidents in the construction sector.
Implementasi MES Pada Testing Dan Pick & Place Station Berbasis Iot Dan Aplikasi Mobile Yuliadi Erdani; Adhitya Sumardi Sunarya; Jody Jovantio
The Indonesian Journal of Computer Science Vol. 13 No. 4 (2024): The Indonesian Journal of Computer Science (IJCS)
Publisher : AI Society & STMIK Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33022/ijcs.v13i4.4163

Abstract

Monitoring and controlling the industrial production process in Indonesia is still mostly done manually, this causes errors and delays in collecting information and the delivery process. Manufacturing execution system (MES) is one type of production management software that is useful for capturing data automatically and in real time. Manufacturing execution system can be implemented with internet technology that can be accessed remotely. Internet of Things (IoT) is a concept that is connected to devices as an internet-based communication medium. MES and IoT can be connected with Flutter which will later become a media interface that will be displayed on mobile applications. The use of mobile-based information systems is intended to optimize data processing and information results.
A Comprehensive Case Study Rekomendasi Implementasi 11 Kontrol keamanan informasi baru ISO 27001:2022 di Perusahaan HealthTech XYZ: Studi Kasus Komprehensif tentang Meningkatkan Kepatuhan dan Keamanan Siber di HealthTech Company Suryo Wibowo, Bimantoro; Rizal Fathoni Aji
The Indonesian Journal of Computer Science Vol. 13 No. 4 (2024): The Indonesian Journal of Computer Science (IJCS)
Publisher : AI Society & STMIK Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33022/ijcs.v13i4.4166

Abstract

This study aims to recommend the implementation of new annex controls in ISO 27001:2022, guided by ISO 27002:2022, for PT XYZ. The research questions addressed are: (1) What are the existing gaps between PT XYZ's current information security controls and the requirements of ISO 27001:2022? (2) What specific recommendations can close these gaps? Using a qualitative case study approach, data were collected in May 2024 through purposive sampling, interviews, observations, and document analysis. Findings reveal that while some controls are partially implemented, others lack full documentation and SOPs. Detailed recommendations were provided to ensure compliance with updated standards, emphasizing formalization into SOPs. This study offers practical guidance for organizations transitioning to ISO 27001:2022, enhancing cybersecurity readiness and compliance with stringent data protection regulations.
Audit Keamanan Informasi Pemasok Pada Perusahaan Penyelenggara Sistem Pembayaran XYZ Mulyadi, Farroh Sakinah; Rizal Fathoni Aji
The Indonesian Journal of Computer Science Vol. 13 No. 4 (2024): The Indonesian Journal of Computer Science (IJCS)
Publisher : AI Society & STMIK Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33022/ijcs.v13i4.4167

Abstract

The relationship between companies and suppliers is one of the manifestations of the company's resource strategy to remain productive and competitive. However, suppliers also create information security risks, such as cybersecurity threats and data protection. To ensure the security of the company's information assets, PT XYZ implements an information security management system based on ISO / IEC 27001: 2022 for all company information assets, both managed by internal and external parties (suppliers). Therefore, this research aims to measure suppliers' criticality level with an information technology asset risk management approach. The company will evaluate the critical suppliers's information security control implementation through systematic monitoring processes such as audits and due diligence. The results of this study indicate that two suppliers at PT XYZ with a high level of criticality need to be audited, and three suppliers with a medium level of criticality need to conduct due diligence.
Analisis Dinamika Komunitas Warganet Twitter Terkait Diskusi Agama Islam Tahun 2009-2019 Fillah Arjuna, Ahmad Salik; Nur Inayah; Taufik Edy Sutanto
The Indonesian Journal of Computer Science Vol. 13 No. 4 (2024): The Indonesian Journal of Computer Science (IJCS)
Publisher : AI Society & STMIK Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33022/ijcs.v13i4.4170

Abstract

Twitter, as a popular social media in Indonesia, is a platform for users to form communities and share information, including about Islam. Opinions generated through this platform can change perceptions about the teachings and practices of Islam in Indonesia. This study aims to understand the structure and evolution of the Muslim community on Twitter through an analysis of community dynamics during 2009-2019. The data was transformed into a graph-shaped network and analyzed using two community detection methods: Louvain and Leiden. Content analysis such as n-grams, hashtags and word clouds were applied to identify the topics of the 3 largest communities. Leiden was shown to produce a higher average modularity value: 0.837, compared to Louvain: 0,833. This research provides deep insights into the community dynamics and discussion topics of Islam in Indonesia on social media, which can serve as a basis for policy makers and academics in managing social and religious issues.
Perancangan Manajemen Risiko Teknologi Informasi Sekretariat Kabinet Republik Indonesia Budiman, Wahyu Arief; Wirani, Yekti; Sucahyo, Yudho Giri
The Indonesian Journal of Computer Science Vol. 13 No. 4 (2024): The Indonesian Journal of Computer Science (IJCS)
Publisher : AI Society & STMIK Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33022/ijcs.v13i4.4171

Abstract

The Cabinet Secretariat of the Republic of Indonesia (Setkab) as a government institution that is responsible for managing cabinet management needs to implement information technology risk management effectively. In line with the Regulation of the Minister for Empowerment of State Apparatus and Bureaucratic Reform (PermenPAN RB) number 5 of 2020 concerning Guidelines for Risk Management of Electronic-Based Government Systems (SPBE), it is necessary to have a design for handling information technology risks. However, Setkab has not yet implemented information technology risk management, resulting in information technology-related risks are not being identified. This study aims to develop a design for information technology risk management that is suitable for the needs and context of Setkab. The method used in the study is qualitative, collecting data through interviews, document analysis, and observation of information technology risks in the Setkab environment. Data analysis uses thematic analysis method. In developing the design for information technology risk management for Setkab, ISO 31000:2018 standard will be used as the main framework, then referring to ISO/IEC 27005:2022, as guidelines for risk assessment and risk treatment activities, and ISO/IEC 27002:2022 as the information security control reference. This research found 340 risk scenarios, 93 of which needed to be mitigated and 247 risks were acceptable. This research produced a risk management design using a combination of ISO 31000:2018 as a general guide for the risk management framework, ISO/IEC 27005:2022 for guidelines on the information technology risk management process, and ISO/IEC 27002:2022 for determining recommendations for risk treatment controls that is expected to help Setkab manage information technology risks systematically.
Numerical Analysis of Flow Velocity and Performance Test of Cross-Flow Turbine (500 W) Kyaw, Sandar; Swe, War War Min; Soe, Aung Kyaw; Latt, Aung Ko
The Indonesian Journal of Computer Science Vol. 13 No. 3 (2024): The Indonesian Journal of Computer Science (IJCS)
Publisher : AI Society & STMIK Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33022/ijcs.v13i3.4175

Abstract

The purpose of this study is to analyze the flow velocity and assess the performance of a cross-flow turbine through numerical simulations and performance tests. Using computational fluid dynamics (CFD), the flow patterns and velocity distributions around the turbine blades to gain insights into the turbine's hydrodynamic behavior. In the experimental phase, constructed a prototype of the cross-flow turbine and tested it in a water flume, measuring key performance metrics such as power output and efficiency.The test were performed under design flow condition. The numerical results were validated with performance tests. The numerical analysis revealed critical areas of flow separation and turbulence, which were consistent with the observed experimental data.
Identifikasi Kanker Darah pada Gambar Apusan Darah Perifer (PBS) Menggunakan Ekstraksi Fitur HSV Nozomi, Irohito; Aldi, Febri
The Indonesian Journal of Computer Science Vol. 13 No. 4 (2024): The Indonesian Journal of Computer Science (IJCS)
Publisher : AI Society & STMIK Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33022/ijcs.v13i4.4177

Abstract

Blood cancer is a category of diseases that have an impact on the development and operation of blood cells. Due to the complexity and diversity of these diseases, proper diagnosis is required before starting treatment. Medical imaging techniques have undergone significant advances in recent years, especially in peripheral blood smear (PBS) image processing. The aim of this study was to uncover how important the extraction of PBS image features is for the diagnosis of blood cancer. Feature extraction is essential to detect anomalies in blood cells in terms of blood cancer detection. The method used is feature extraction based on hue and saturation values (HSV) and uses Machine Support Vector Machine (SVM) machine learning algorithms in classifying malignant and benign PBS images. PBS image data used in this study was 100 images, consisting of 50 malignant PBS images, and 50 benign PBS images. Through the application of HSV feature extraction techniques and PBS image analysis, SVM algorithms can uncover latent indicators of blood cancer and facilitate timely and precise diagnosis. With the SVM technique, classification accuracy can be achieved by 92%. These results demonstrate the potential effectiveness of this feature extraction method. Extraction of HSV features may alter the diagnosis of blood cancer with additional research and application in clinical settings.
Perbandingan Penggunaan Daya Listrik Antara Baremetal Dengan Docker Container Pada Raspberry Pi 4B Hasvid Dwi Putranto; Muhammad Koprawi, S.Kom., M.Eng.
The Indonesian Journal of Computer Science Vol. 13 No. 4 (2024): The Indonesian Journal of Computer Science (IJCS)
Publisher : AI Society & STMIK Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33022/ijcs.v13i4.4178

Abstract

In today's development, many services are starting to use Container base services where it is easier to do development and there is also a lot of implementation documentation. But there are also those who still use Baremetal where installing the service is installed directly on the Operating System (OS) and some people are used to using Baremetal in this case the application on the Edge Server or Internet of Things (IoT) such as on the Raspberry Pi, electricity usage is a limitation in making an efficient system so that in this study, will compare electricity usage in Input/output operations per second (IOPS) and Floating point operations per second (Flops). And the results show that Baremetal's electricity usage is smaller than that of Docker Container where the difference is 1.06 GigaFlops/Watt on HPLinpack and on IOPS/Watt, Baremetal is far superior to Docker Container where in IOPS read/Watt superior to 3246.12 and in IOPS write/Watt superior to 1857.51 it is because Docker Container uses several services to run its Container so that it consumes more power.

Page 67 of 113 | Total Record : 1127


Filter by Year

2022 2026


Filter By Issues
All Issue Vol. 15 No. 1 (2026): The Indonesian Journal of Computer Science Vol. 14 No. 6 (2025): The Indonesian Journal of Computer Science Vol. 14 No. 5 (2025): The Indonesian Journal of Computer Science Vol. 14 No. 4 (2025): The Indonesian Journal of Computer Science Vol. 14 No. 3 (2025): The Indonesian Journal of Computer Science Vol. 14 No. 2 (2025): The Indonesian Journal of Computer Science Vol. 14 No. 1 (2025): The Indonesian Journal of Computer Science (IJCS) Vol. 13 No. 6 (2024): The Indonesian Journal of Computer Science (IJCS) Vol. 13 No. 5 (2024): The Indonesian Journal of Computer Science (IJCS) Vol. 13 No. 4 (2024): The Indonesian Journal of Computer Science (IJCS) Vol. 13 No. 3 (2024): The Indonesian Journal of Computer Science (IJCS) Vol. 13 No. 2 (2024): The Indonesian Journal of Computer Science (IJCS) Vol. 13 No. 1 (2024): The Indonesian Journal of Computer Science (IJCS) Vol. 12 No. 6 (2023): The Indonesian Journal of Computer Science (IJCS) Vol. 12 No. 5 (2023): The Indonesian Journal of Computer Science (IJCS) Vol. 12 No. 4 (2023): The Indonesian Journal of Computer Science (IJCS) Vol. 12 No. 3 (2023): The Indonesian Journal of Computer Science Vol. 12 No. 2 (2023): The Indonesian Journal of Computer Science Vol. 12 No. 1 (2023): The Indonesian Journal of Computer Science Vol. 11 No. 3 (2022): The Indonesian Journal of Computer Science Vol. 11 No. 2 (2022): The Indonesian Journal of Computer Science Vol. 11 No. 1 (2022): The Indonesian Journal of Computer Science More Issue