+62 813-8532-9115 info@scirepid.com

 

Article indexed DOI

International Journal of Computer Technology and Science

Tahun , Volume , Issue .
 
Hybrid Zero Trust Container Based Model for Proactive Service Continuity under Intelligent DDoS Attacks in Cloud Environment (Danang Danang, Eko Siswanto, Nuris Dwi Setiawan)
DOI : 10.62951/ijcts.v2i3.291 - Volume: 2, Issue: 3, Sitasi : 0
30-Jul-2025 | Abstrak | PDF File | Resource | Last.13-Aug-2025
A Comprehensive Survey on Emerging Trends in Networking and Communication : From IoT to Edge Computing (Ahmed Jumaa Lafta, Aya Falah Mahmood)
DOI : 10.62951/ijcts.v2i1.137 - Volume: 2, Issue: 1, Sitasi : 0
17-Jan-2025 | Abstrak | PDF File | Resource | Last.13-Aug-2025
Analysis of the Implementation of Metaverse Technology as a Media for Socializing Religious Moderation with a Qualitative Approach At the Palembang Religious Education and Training Center (Angga Madona, Sri Rahayu, Yevi Grata Putra, Tata Sutabri)
DOI : 10.62951/ijcts.v2i1.133 - Volume: 2, Issue: 1, Sitasi : 0
30-Dec-2024 | Abstrak | PDF File | Resource | Last.13-Aug-2025
Comparative between the binary thresholding technique and the Otsu method for the people detection (Serri Ismael Hamad)
DOI : 10.62951/ijcts.v2i1.134 - Volume: 2, Issue: 1, Sitasi : 0
08-Jan-2025 | Abstrak | PDF File | Resource | Last.13-Aug-2025
Implementation of Augmented Reality with Marker Based Tracking on Custom Gift Products by Tricksy.co (Raisa Mutia Thahir, Jasmine Aulia Mumtaz, Kinaya Khairunnisa Komariansyah, Wien Kuntari)
DOI : 10.62951/ijcts.v2i1.130 - Volume: 2, Issue: 1, Sitasi : 0
10-Dec-2024 | Abstrak | PDF File | Resource | Last.27-Jul-2025
Design and Development of LeleQue : A Web-Based Financial Management Application for Catfish Farming MSME (Jonser Steven, Arya Dimas Wicaksana, Helena Dewi Hapsari, Wien Kuntari)
DOI : 10.62951/ijcts.v2i1.131 - Volume: 2, Issue: 1, Sitasi : 0
10-Dec-2024 | Abstrak | PDF File | Resource | Last.27-Jul-2025
Web-Based Financial Information System Testing of PT Perta Sakti Abadi Using the Black Box Testing Method (Rajhaga Jevannya Meliala, Aulia Anggraeni, Wildan Holik, Jonser Steven Rajali Manik, Ghaeril Juniawan Parel Hakim, Gema Parasti Mindara, Aditya Wicaksono)
DOI : 10.62951/ijcts.v2i1.129 - Volume: 2, Issue: 1, Sitasi : 0
04-Dec-2024 | Abstrak | PDF File | Resource | Last.06-Aug-2025
Functional Testing of the JivaJoy Online Product Stock Management and Ordering System Software Using Black Box Testing (Jasmine Aulia Mumtaz, Kinaya Khairunnisa Komariansyah, Helena Dewi Hapsari, Bima Julian Mahardhika, Luthfi Dika Chandra, Muhammad Rafi' Rusafni, Aditya Wicaksono, Gema Parasti Mindara)
DOI : 10.62951/ijcts.v2i1.126 - Volume: 2, Issue: 1, Sitasi : 0
29-Nov-2024 | Abstrak | PDF File | Resource | Last.06-Aug-2025
The Influence of MBKM Project-Based Learning on Problem Solving of Educational Technology Undergraduate Students at Bina Mandiri University Gorontalo (Frezy Paputungan)
DOI : 10.62951/ijcts.v2i1.125 - Volume: 2, Issue: 1, Sitasi : 0
25-Nov-2024 | Abstrak | PDF File | Resource | Last.27-Jul-2025
Advanced Technologies For Remote Access To Home Internet: A Review Of Potential Solutions And Their Implications (Md Ziaur Rahman)
DOI : 10.62951/ijcts.v2i1.127 - Volume: 2, Issue: 1, Sitasi : 0
29-Nov-2024 | Abstrak | PDF File | Resource | Last.27-Jul-2025
Enhancing Security in Industrial IoT: Authentication Solutions Leveraging Blockchain Technology (Rebecca Ling Ze Siew, Brendan Chan Kah Le, Lee Kai Yue, Nuri Nazirah Binti Ismail, Xavier Liong Zhi Hao, Muhammad Faisal)
DOI : 10.62951/ijcts.v1i3.29 - Volume: 1, Issue: 3, Sitasi : 0
18-Jul-2024 | Abstrak | PDF File | Resource | Last.27-Jul-2025
Advancements in Multi-Factor Authentication: A Quantum-Resilient and Federated Approach for Enhanced Security (Nur Syahrina Binti Juni, Grasila Huney Wan, Siti Aisyah Nabilah Binti Banchi, Estella Blessings, Venetha A/P Loganathan, Muhammad Faisal)
DOI : 10.62951/ijcts.v1i3.26 - Volume: 1, Issue: 3, Sitasi : 0
18-Jul-2024 | Abstrak | PDF File | Resource | Last.06-Aug-2025
Enhancing Authentication Security: Analyzing Time-Based One-Time Password Systems (Asyura Binti Sofian, Ayu Fitri Alafiah Binti Peradus, Fidel Yong, Irvine Shearer, Nurrul Nazwa Binti Ismail, Yugendran A/L Mahendran, Muhammad Faisal)
DOI : 10.62951/ijcts.v1i3.25 - Volume: 1, Issue: 3, Sitasi : 0
18-Jul-2024 | Abstrak | PDF File | Resource | Last.06-Aug-2025
Enhancing Edge Computing Performance for IoT Applications Using Federated Learning Techniques (Lucas Henry Young, Grace Olivia Hall)
DOI : 10.62951/ijcts.v1i1.57 - Volume: 1, Issue: 1, Sitasi : 0
30-Jan-2024 | Abstrak | PDF File | Resource | Last.06-Aug-2025
Image Processing Techniques for Enhancing Satellite Imagery in Disaster Management (Amanda Putri, Budi Hartono, Nike Ayu)
DOI : 10.62951/ijcts.v1i1.60 - Volume: 1, Issue: 1, Sitasi : 0
30-Jan-2024 | Abstrak | PDF File | Resource | Last.06-Aug-2025
Blockchain-Based Secure Voting System: A Comparative Analysis of Consensus Protocols (Elizabeth Anne Johnson, Victoria Grace Wilson, William Robert Thompson)
DOI : 10.62951/ijcts.v1i1.61 - Volume: 1, Issue: 1, Sitasi : 0
30-Jan-2024 | Abstrak | PDF File | Resource | Last.27-Jul-2025
Leveraging Machine Learning Models for Real-Time Fraud Detection in Financial Transactions (Nathaniel Andrew Davis, Sophia Anne Harris)
DOI : 10.62951/ijcts.v1i1.56 - Volume: 1, Issue: 1, Sitasi : 0
30-Jan-2024 | Abstrak | PDF File | Resource | Last.27-Jul-2025
Multi-Factor Authentication Using Blockchain: Enhancing Privacy, Security and Usability (Irenna Wanisha, Jaymaxcklien Bravyain James, Jeremy Silas Witeno, Luqmanul Hakim Mohammad Bakery, Melvianna Samuel, Muhammad Faisal)
DOI : 10.62951/ijcts.v1i3.24 - Volume: 1, Issue: 3, Sitasi : 0
18-Jul-2024 | Abstrak | PDF File | Resource | Last.27-Jul-2025
The Role Of Quantum Computing in Optimizing Machine Learning Algorithms (Nattapong Chaiyathorn, Pimchanok Anuwat)
DOI : 10.62951/ijcts.v1i2.64 - Volume: 1, Issue: 2, Sitasi : 0
30-Apr-2024 | Abstrak | PDF File | Resource | Last.27-Jul-2025
Development Of Blueprint Enterprise Architecture In Academic Field Using Zachman Framework (Guntur Guntur, Sutedi Sutedi)
DOI : 10.62951/ijcts.v2i1.119 - Volume: 2, Issue: 1, Sitasi : 0
21-Nov-2024 | Abstrak | PDF File | Resource | Last.27-Jul-2025
Enhancing Cybersecurity In Smart Cities Through IoT Device Management (Siti Aminah Binti Ismail, Ahmad Faizal Bin Mohd Ali)
DOI : 10.62951/ijcts.v1i2.62 - Volume: 1, Issue: 2, Sitasi : 0
30-Apr-2024 | Abstrak | PDF File | Resource | Last.27-Jul-2025
Optimization Of Big Data Processing Using Distributed Computing In Cloud Environments (Rahul Dev Singh, Vikram Kumar Gupta, Priya Anjali Patel)
DOI : 10.62951/ijcts.v1i2.58 - Volume: 1, Issue: 2, Sitasi : 0
30-Apr-2024 | Abstrak | PDF File | Resource | Last.27-Jul-2025
Automated Detection Of Network Intrusions Using Machine Learning in Real-Time Systems (Aulia Novi, Ryan Satria)
DOI : 10.62951/ijcts.v1i2.63 - Volume: 1, Issue: 2, Sitasi : 0
30-Apr-2024 | Abstrak | PDF File | Resource | Last.27-Jul-2025
Enhancing IIoT Security: AI-Driven Blockchain-Based Authentication Scheme (Azreen Shafieqah Asri, Faizatul Fitri Boestamam, Harith Zakwan Bin Zakaria, Mohammad Amir Alam Rahim Omar, Mohammad Hamka Izzuddin Bin Mohamad Yahya, Muhammad Faisal)
DOI : 10.62951/ijcts.v1i3.19 - Volume: 1, Issue: 3, Sitasi : 0
17-Jul-2024 | Abstrak | PDF File | Resource | Last.27-Jul-2025
Evaluation of Information Technology Service Governance Using the ITIL Method : A Strategy for Improving Business Intelligence Efficiency at Bank Rakyat Indonesia (Andysah Putera Utama Siahaan, Wiko Pratama, Juliyandri Saragih, Muhammad Indra, Muhammad Wahyudi)
DOI : 10.62951/ijcts.v2i1.115 - Volume: 2, Issue: 1, Sitasi : 0
21-Nov-2024 | Abstrak | PDF File | Resource | Last.27-Jul-2025
Design GiggleGate as Desktop Virtual Assistant with Face and Speech Recognition Authentication System (Jasmine Aulia Mumtaz, Kinaya Khairunnisa Komariansyah, Wildan Holik, Reza Pratama, Muhammad Galuh Gumelar, Endang Purnama Giri, Gema Parasti Mindara)
DOI : 10.62951/ijcts.v1i4.113 - Volume: 1, Issue: 4, Sitasi : 0
31-Oct-2024 | Abstrak | PDF File | Resource | Last.06-Aug-2025
Evaluating the Efficacy of Quantum Algorithms in Cryptographic Security (Novia Fitri, Lana Putra)
DOI : 10.62951/ijcts.v1i1.65 - Volume: 1, Issue: 1, Sitasi : 0
30-Jan-2024 | Abstrak | PDF File | Resource | Last.06-Aug-2025
Securing Industrial IoT: Blockchain-Integrated Solutions for Enhanced Privacy, Authentication, and Efficiency (Derrick Lim Kin Yeap, Jason Jong Sheng Tat, Jason Ng Yong Xing, Joan Sia Yuk Ting, Mildred Lim Pei Chin, Muhammad Faisa)
DOI : 10.62951/ijcts.v1i3.18 - Volume: 1, Issue: 3, Sitasi : 0
17-Jul-2024 | Abstrak | PDF File | Resource | Last.06-Aug-2025
Sentiment Analysis Of Social Media Data Using Deep Learning Techniques (Salsabila Septiani, Nabila Putri, Dara Jessica, Arya Saputra)
DOI : 10.62951/ijcts.v1i2.59 - Volume: 1, Issue: 2, Sitasi : 0
30-Apr-2024 | Abstrak | PDF File | Resource | Last.06-Aug-2025
Preparation of Information Technology (IT) Master Plan of SMK Ma’arif 1 Metro Using the Open Group Architecture Framework (TOGAF) Method (Risa Ayuna, Sutedi Sutedi)
DOI : 10.62951/ijcts.v1i4.47 - Volume: 1, Issue: 4, Sitasi : 0
11-Oct-2024 | Abstrak | PDF File | Resource | Last.06-Aug-2025