cover
Contact Name
Joseph Dedy Irawan
Contact Email
joseph@lecturer.itn.ac.id
Phone
+62811367463
Journal Mail Official
ijcomit@itn.ac.id
Editorial Address
Malang National Institute of Technology Jl. Raya Karanglo Km. 2 Malang, Indonesia
Location
Kota malang,
Jawa timur
INDONESIA
International Journal of Computer Science and Information Technology
ISSN : -     EISSN : 30324955     DOI : https://doi.org/10.36040/ijcomit
Core Subject : Science,
IJCOMIT is a journal of Computer Science and Informatics Technology published by the Computer Science Department, Malang National Institute of Technology, Indonesia, this journal aims to accommodate research articles in the field of Computer Science and Informatics which include programming, interfacing, artificial intelligence, computer networks, cloud technology , embedded systems, image processing, databases, e-commerce, decision-making systems, as well as other fields relevant to Information Technology to publish scientific works in a wide audience.
Articles 19 Documents
INVESTIGATING CCTV BREACHES: THE MIRNA SALIHIN DEATH CASE (COFFEE CYANIDE) Ahmad Fahrudi Setiawan; Suryo Adi Wibowo; Akbar Bimantara Trahestiawan
International Journal of Computer Science and Information Technology Vol. 1 No. 2 (2024): IJCOMIT Vol 1 No 2
Publisher : Computer Science Department, Malang National Institute of Technology

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36040/ijcomit.v1i2.12207

Abstract

The death of Mirna Salihin in 2016, allegedly caused by cyanide poisoning in a cup of iced coffee, shocked Indonesia and raised significant questions about the integrity of digital evidence in criminal investigations. One of the key pieces of evidence in this case was the CCTV footage from a café, which was critical in establishing the sequence of events leading to Mirna's death. However, the investigation was complicated by the breach and manipulation of the CCTV data, leading to concerns about the authenticity and reliability of digital evidence in criminal trials. This paper explores the role of CCTV footage in criminal investigations, specifically in the context of the Mirna Salihin case. We analyze how the breach of digital evidence impacted the investigation, the challenges associated with preserving and verifying CCTV footage, and the implications for the legal admissibility of digital evidence. Additionally, we discuss the importance of ensuring the integrity of surveillance systems and the ethical and legal frameworks that govern the collection and handling of digital evidence. By examining this case, the paper highlights the critical need for robust digital forensic practices and transparency in the handling of digital evidence, especially in high-profile criminal cases where the stakes are high
IMPLEMENTATION OF HYBRID VLAN NETWORK CONFIGURATION Michael Jordan; Joseph Dedy Irawan; Yohanes Yudha Saputra Bangko; Maqila Sulaiman Abu Zakaria
International Journal of Computer Science and Information Technology Vol. 1 No. 2 (2024): IJCOMIT Vol 1 No 2
Publisher : Computer Science Department, Malang National Institute of Technology

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36040/ijcomit.v1i2.12319

Abstract

The need for internet access has become a necessity provided by all agencies, where in the research conducted on campus 2 of the National Institute of Technology Malang, where the VLANs distributed are approximately 25, so that in distributing internet access requires good network management, where by implementing Hybrid VLAN the IP distribution process is easier and increases the efficiency of network management, by using Hybrid VLAN, the trunking process and IP access are carried out on the router side, From the results of the Implementation of Hybrid VLAN Network Configuration on the ITN Malang Infrastructure, it can be concluded as follows: The implementation of Hybrid VLAN has succeeded in increasing network efficiency by separating network traffic based on function and department, thereby reducing traffic density and improving overall performance, By separating the network into several VLANs, the level of isolation between various network segments has increased, which has an impact on increasing security and reducing the risk of unauthorized access, by implementing a Hybrid VLAN Network, network administrators can manage bandwidth according to the needs of the VLAN segment easily and quickly
STOCK PRICE PREDICTION FOR BANK SYARIAH INDONESIA USING BIDIRECTIONAL LONG SHORT-TERM MEMORY (BI-LSTM) Deddy Rudhistiar; Muhammad Hasan Wahyudi; Widhy Wahyani; Thesa Adi Saputra Yusri
International Journal of Computer Science and Information Technology Vol. 1 No. 2 (2024): IJCOMIT Vol 1 No 2
Publisher : Computer Science Department, Malang National Institute of Technology

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36040/ijcomit.v1i2.12320

Abstract

The evolution of global financial markets has heightened the demand for accurate stock price prediction methods, particularly in the Islamic banking sector, which operates under unique principles of Sharia compliance. This study aims to predict the stock prices of Bank Syariah Indonesia (BSI) using a Bidirectional Long Short-Term Memory (Bi-LSTM) model. The dataset comprises daily closing prices from January 2022 to June 2024. The model is optimized through systematic hyperparameter tuning, including configurations for the number of layers, neurons, batch size, learning rate, and optimizers. Evaluation using Mean Absolute Percentage Error (MAPE) and Root Mean Square Error (RMSE) identifies the Adam optimizer with a learning rate of 0.001 and batch size of 16 as the optimal configuration. The results highlight that while increasing the number of neurons or layers reduces minimum error, it increases model instability. This research provides novel insights into the application of Bi-LSTM for predicting Islamic banking stock prices, supporting data-driven decision-making in the Islamic financial sector.
IMPROVING END-TO-END ENCRYPTION SECURITY ON HTTP USING A GREGORIAN DAN JAVANESE CALENDAR-BASED KEY GENERATOR Eko Heri Susanto; Yohanes Dwi Cahyono; Riyant Budi S
International Journal of Computer Science and Information Technology Vol. 2 No. 1 (2025): IJCOMIT Vol 2 No 1
Publisher : Computer Science Department, Malang National Institute of Technology

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36040/ijcomit.v2i1.12872

Abstract

This research investigates an end-to-end encryption method with a dynamic key generator based on the conversion of the Gregorian calendar to the Javanese calendar to improve the security of the Hypertext Transfer Protocol (HTTP) and Hypertext Transfer Protocol Secure (HTTPS) protocols, which remain vulnerable to attacks. The research generates unique asymmetric keys down to the millisecond level without affecting the speed of the web server. However, this method has a downside: the data size (transfer size) doubles because the ciphertext encoding still uses hexadecimal
UTILIZING RC5 ENCRYPTION TO OPTIMIZE CONTENT SECURITY IN WEB APPLICATIONS Wirpan Atmaja Putra; Alldino Allban Prakasa; Yohanes Dwi Cahyono
International Journal of Computer Science and Information Technology Vol. 2 No. 1 (2025): IJCOMIT Vol 2 No 1
Publisher : Computer Science Department, Malang National Institute of Technology

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36040/ijcomit.v2i1.13101

Abstract

The rapid advancement of information and communication technology has led to an increased use of web applications, but also brought challenges in data security. The widely used HTTP protocol remains vulnerable to threats such as data theft and cyber-attacks. One solution to mitigate these issues is the use of client-side encryption methods, such as the RC5 algorithm, which provides high flexibility in encryption parameter configurations. This research analyzes the implementation of the RC5 algorithm in enhancing web application data security. A web application prototype utilizing RC5 encryption was developed and tested for encryption time, decryption time, and memory consumption. Test results indicate that the RC5 algorithm enhances data security without significantly compromising application performance. However, an increase in processing load was observed on low-specification devices. This study also highlights the importance of adjusting RC5 parameters to balance security and performance
SECURITY ANALYSIS OF COLLEGE WEBSITES USING VULNERABILITY ASSESSMENT METHOD Dio Wahyu Saputra; Risqy Siwi Pradini; Mochammad Anshori
International Journal of Computer Science and Information Technology Vol. 2 No. 1 (2025): IJCOMIT Vol 2 No 1
Publisher : Computer Science Department, Malang National Institute of Technology

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36040/ijcomit.v2i1.13206

Abstract

Web application security, especially on college websites, is a critical aspect in maintaining data integrity and protecting users from cyber threats. This research evaluates the security of college websites using the vulnerability assessment method. By utilizing tools such as OWASP ZAP and penetration testing techniques, this research identifies weaknesses at various security layers, including vulnerabilities to Path Traversal attacks, SQL Injection, and deficiencies in the implementation of HTTP security header settings. The analysis shows that the main vulnerabilities are caused by a lack of input validation, inadequate security configuration, and the use of outdated software libraries. This research provides practical solutions such as strengthening security configurations, system updates, and implementing modern security policies to mitigate risks. These findings aim to enhance the security of college websites and create a safer online environment.
DEVELOPMENT OF INFORMATION SYSTEM FOR BOARDING HOUSES Betty Dewi Puspasari; Joseph Dedy Irawan; Ridho Arif Wicaksono; Dimas Rizky Pratama; Ahmad Bahrul Ilmi
International Journal of Computer Science and Information Technology Vol. 2 No. 1 (2025): IJCOMIT Vol 2 No 1
Publisher : Computer Science Department, Malang National Institute of Technology

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36040/ijcomit.v2i1.13659

Abstract

The management of boarding houses through manual bookkeeping still faces many challenges, such as recording errors, difficulty in monitoring room availability, and inefficiencies in communication between the manager and tenants. boarding houses face these issues, which can potentially lead to conflicts due to misinformation regarding billing and room status.To address these problems, this study aims to develop a web-based boarding house management information system integrated with WhatsApp as a billing notification tool. This system is designed to reduce recording errors, improve room management efficiency, and facilitate communication between tenants and the boarding house manager.With the implementation of this system, it is expected that boarding house managers can easily access tenant data, monitor room status in real-time, and automate the billing process for tenants. The expected outcome of this system development is improved efficiency in boarding house management, increased data recording accuracy, and ease of monitoring and communication
DEVELOPMENT OF A WEB-BASED REGISTRATION SYSTEM AT THE TUNJUNGSEKAR SUBDISTRICT OFFICE Deddy Rudhistiar; Muhammad Hasan Wahyudi; Cornelia Luba Tara Boro; Siti Mutiara; Thesa Adi Saputra Yusri
International Journal of Computer Science and Information Technology Vol. 2 No. 1 (2025): IJCOMIT Vol 2 No 1
Publisher : Computer Science Department, Malang National Institute of Technology

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36040/ijcomit.v2i1.14171

Abstract

The Tunjungsekar subdistrict office regularly organizes various activities involving local participants. Currently, the registration process is conducted using Google Forms, which, while facilitating data collection, presents challenges such as duplicate registrations and difficulties in managing participant quotas. Additionally, participant data processing and activity summaries are still handled manually, reducing administrative efficiency. To address these issues, a web-based registration system was developed using PHP with the Laravel framework and a MySQL database. This system enables automatic validation to prevent duplicate registrations and allows for more effective participant quota management. Blackbox taesting shows that the system works, the system functions properly without significant bugs or errors. With this system, activity data management becomes more structured, participant records are more accurate, and administrative processes are more efficient. The implementation of this system is expected to support the digitalization of community services and enhance the community’s experience in accessing information and services more practically and systematically
DEVELOPMENT OF A MOTION AND SOUND SENSOR-BASED SMART TRASH CAN WITH A BUZZER NOTIFICATION SYSTEM Rumahorbo, Daniel; Hasangapon Perapat, Gerhard; Khoiri Nasution, Aurela; Naufal, Ahmad; Arnita, Arnita
International Journal of Computer Science and Information Technology Vol. 2 No. 2 (2025): IJCOMIT Vol 2 No 2
Publisher : Computer Science Department, Malang National Institute of Technology

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36040/ijcomit.v2i2.16443

Abstract

Waste management remains a critical environmental challenge. This research aims to design and implement a prototype of a smart trash bin based on motion and sound sensors with an automatic notification system to improve efficiency and hygiene. The system utilizes an Arduino Uno microcontroller as the central control unit, integrated with two HC-SR04 ultrasonic sensors and a buzzer. The first sensor detects the user's hand movement to automatically open and close the lid via a servo motor, enabling a contactless process. The second sensor measures the waste level inside the bin; when the trash reaches full capacity, the system activates the buzzer as a local notification for cleaning personnel. The prototype was tested in a laboratory setting, and the results confirm that all components functioned optimally according to the design. The system successfully provides an innovative, practical, and efficient solution for smarter waste management, serving as an early implementation of appropriate technology that operates independently without an internet connection

Page 2 of 2 | Total Record : 19