cover
Contact Name
Purwanto
Contact Email
garuda@apji.org
Phone
+6285642100292
Journal Mail Official
fatqurizki@apji.org
Editorial Address
Perum Cluster G11 Nomor 17 Jl. Plamongan Indah, Kadungwringin, Pedurungan, Semarang, Provinsi Jawa Tengah, 50195
Location
Kota semarang,
Jawa tengah
INDONESIA
International Journal of Computer Technology and Science
ISSN : 30481899     EISSN : 30481961     DOI : 10.62951
Core Subject : Science,
This Journal accepts manuscripts based on empirical research, both quantitative and qualitative. The scope of the this Journal covers the fields of Computer Technology and Science. This journal is a means of publication and a place to share research and development work in the field of technology.
Articles 45 Documents
Sentiment Analysis Of Social Media Data Using Deep Learning Techniques Salsabila Septiani; Nabila Putri; Dara Jessica; Arya Saputra
International Journal of Computer Technology and Science Vol. 1 No. 2 (2024): April : International Journal of Computer Technology and Science
Publisher : Asosiasi Riset Teknik Elektro dan Infomatika Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62951/ijcts.v1i2.59

Abstract

Social media platforms contain vast amounts of data that can reveal public sentiment on various topics. This research explores the application of deep learning techniques, particularly convolutional neural networks (CNN) and recurrent neural networks (RNN), to analyze sentiment within social media text. The results indicate that these models achieve high accuracy in sentiment classification, making them valuable tools for companies seeking to understand public opinion.
Image Processing Techniques for Enhancing Satellite Imagery in Disaster Management Amanda Putri; Budi Hartono; Nike Ayu
International Journal of Computer Technology and Science Vol. 1 No. 1 (2024): January : International Journal of Computer Technology and Science
Publisher : Asosiasi Riset Teknik Elektro dan Infomatika Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62951/ijcts.v1i1.60

Abstract

This study examines advanced image processing techniques to improve satellite imagery for use in disaster management and recovery efforts. Through methods like deep learning-based image segmentation and noise reduction, we enhance image clarity and detail, allowing for better decision-making in emergency response. The results indicate a significant improvement in identifying affected areas, aiding faster and more accurate response.
Blockchain-Based Secure Voting System: A Comparative Analysis of Consensus Protocols Elizabeth Anne Johnson; Victoria Grace Wilson; William Robert Thompson
International Journal of Computer Technology and Science Vol. 1 No. 1 (2024): January : International Journal of Computer Technology and Science
Publisher : Asosiasi Riset Teknik Elektro dan Infomatika Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62951/ijcts.v1i1.61

Abstract

Blockchain technology presents a decentralized and transparent solution for secure voting systems. This paper provides a comparative analysis of consensus protocols, such as Proof of Work (PoW), Proof of Stake (PoS), and Delegated Proof of Stake (DPoS), to evaluate their effectiveness in a secure voting environment. Results show that PoS offers optimal security with reduced energy consumption, making it suitable for public elections.
Enhancing Cybersecurity In Smart Cities Through IoT Device Management Siti Aminah Binti Ismail; Ahmad Faizal Bin Mohd Ali
International Journal of Computer Technology and Science Vol. 1 No. 2 (2024): April : International Journal of Computer Technology and Science
Publisher : Asosiasi Riset Teknik Elektro dan Infomatika Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62951/ijcts.v1i2.62

Abstract

The rise of smart cities brings increased interconnectivity, but also new security vulnerabilities, especially among IoT devices. This study investigates methods for improving cybersecurity in smart cities by implementing IoT device management protocols. We examine approaches such as network segmentation and secure authentication to mitigate common threats, thus providing a safer environment for urban digital infrastructure.
Automated Detection Of Network Intrusions Using Machine Learning in Real-Time Systems Aulia Novi; Ryan Satria
International Journal of Computer Technology and Science Vol. 1 No. 2 (2024): April : International Journal of Computer Technology and Science
Publisher : Asosiasi Riset Teknik Elektro dan Infomatika Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62951/ijcts.v1i2.63

Abstract

Network intrusion detection is crucial for maintaining the integrity of real-time systems. This paper evaluates various machine learning algorithms, including support vector machines (SVM) and decision trees, for real-time intrusion detection. Through extensive testing on simulated datasets, the study highlights the advantages of automated detection in reducing response times and enhancing network security.
The Role Of Quantum Computing in Optimizing Machine Learning Algorithms Nattapong Chaiyathorn; Pimchanok Anuwat
International Journal of Computer Technology and Science Vol. 1 No. 2 (2024): April : International Journal of Computer Technology and Science
Publisher : Asosiasi Riset Teknik Elektro dan Infomatika Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62951/ijcts.v1i2.64

Abstract

Quantum computing has the potential to revolutionize machine learning by offering exponential speed-up for specific algorithms. This study explores the theoretical and practical implications of using quantum computing to optimize machine learning models, such as in training neural networks. The findings provide insights into the possible improvements in computational efficiency, particularly for large datasets and complex models.
Evaluating the Efficacy of Quantum Algorithms in Cryptographic Security Novia Fitri; Lana Putra
International Journal of Computer Technology and Science Vol. 1 No. 1 (2024): January : International Journal of Computer Technology and Science
Publisher : Asosiasi Riset Teknik Elektro dan Infomatika Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62951/ijcts.v1i1.65

Abstract

With quantum computing’s rise, traditional cryptographic methods face new security challenges. This paper evaluates the effectiveness of various quantum algorithms, such as Shor’s and Grover’s algorithms, on current encryption standards. Our findings highlight the vulnerabilities in conventional cryptography and suggest new standards and protocols to maintain data security in a quantum-driven era.
Design GiggleGate as Desktop Virtual Assistant with Face and Speech Recognition Authentication System Jasmine Aulia Mumtaz; Kinaya Khairunnisa Komariansyah; Wildan Holik; Reza Pratama; Muhammad Galuh Gumelar; Endang Purnama Giri; Gema Parasti Mindara
International Journal of Computer Technology and Science Vol. 1 No. 4 (2024): October: International Journal of Computer Technology and Science
Publisher : Asosiasi Riset Teknik Elektro dan Infomatika Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62951/ijcts.v1i4.113

Abstract

In recent years, virtual assistants have become an integral part of everyday life, simplifying routine tasks and allowing users to focus on more important matters. This research aiming to design GiggleGate, a virtual desktop assistant integrated with both face and speech recognition technology to enhance authentication security. The objective is to develop an authentication system that not only verifies user identity but also provides a more intuitive experience and seamless interaction. The research employs a development methodology to create and implement the system, which integrates face recognition via OpenCV and speech recognition via a Python library. The findings indicate that the integration of these technologies enhances security and user experience by offering dual-factor authentication. The system is expected to contribute to more secure and accessible virtual assistant applications, offering both a practical and efficient solution for users. The implications of this study suggest that the combination of face and speech recognition can provide an effective means to protect user privacy and improve the overall functionality of desktop assistants.
Evaluation of Information Technology Service Governance Using the ITIL Method : A Strategy for Improving Business Intelligence Efficiency at Bank Rakyat Indonesia Andysah Putera Utama Siahaan; Wiko Pratama; Juliyandri Saragih; Muhammad Indra; Muhammad Wahyudi
International Journal of Computer Technology and Science Vol. 2 No. 1 (2025): International Journal of Computer Technology and Science
Publisher : Asosiasi Riset Teknik Elektro dan Infomatika Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62951/ijcts.v2i1.115

Abstract

Information Technology (IT) service management plays a critical role in supporting the efficiency and effectiveness of business intelligence processes within modern organizations. This study aims to evaluate IT service governance in Bank Rakyat Indonesia using the Information Technology Infrastructure Library (ITIL) framework. This approach focuses on improving operational efficiency, service management, and aligning IT services with business needs. The research method involves a detailed analysis of service processes and activities based on ITIL stages, ranging from service strategy to continuous improvement. The findings indicate that ITIL implementation significantly enhances IT service management and promotes business intelligence effectiveness within the organization. Recommendations for further development are also provided to improve the quality and speed of IT services in the future.
Development Of Blueprint Enterprise Architecture In Academic Field Using Zachman Framework Guntur Guntur; Sutedi Sutedi
International Journal of Computer Technology and Science Vol. 2 No. 1 (2025): International Journal of Computer Technology and Science
Publisher : Asosiasi Riset Teknik Elektro dan Infomatika Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62951/ijcts.v2i1.119

Abstract

The Zachman Framework is one of the methods that can be used to design systems in a structured and comprehensive manner. This study aims to apply the Zachman Framework to design the academic system at SMA Al Kautsar Bandar Lampung, resulting in a blueprint that serves as a guide for system development. The research method involves mapping each perspective in the Zachman Framework, namely Planner (scope), Owner (business model), Designer (system model), and Builder (technology implementation). The findings indicate that the Zachman Framework ensures that all essential aspects of the system are considered, resulting in a structured enterprise architecture design that is efficient and meets stakeholder needs. Furthermore, this framework has proven effective in integrating data and synergizing business functions in the academic section, supporting optimal operations. The implications of this study suggest that the Zachman Framework can serve as an alternative solution for designing and developing an organized, directed, and easily implementable academic system, thus improving the efficiency of business processes in educational institutions.