cover
Contact Name
Fergyanto F. Gunawan
Contact Email
fgunawan@binus.edu
Phone
+62215345830
Journal Mail Official
-
Editorial Address
Jl. Kebun Jeruk Raya No. 27, Kemanggisan / Palmerah Jakarta Barat 11530
Location
Kota adm. jakarta barat,
Dki jakarta
INDONESIA
CommIT (Communication & Information Technology)
ISSN : 19792484     EISSN : 24607010     DOI : -
Core Subject : Science,
Journal of Communication and Information Technology (CommIT) focuses on various issues spanning: software engineering, mobile technology and applications, robotics, database system, information engineering, artificial intelligent, interactive multimedia, computer networking, information system audit, accounting information system, information technology investment, information system development methodology, strategic information system (business intelligence, decision support system, executive information system, enterprise system, knowledge management), e-learning, and e-business (e-health, e-commerce, e-supply chain management, e-customer relationship management, e-marketing, and e-government). The journal is published in affiliation with Research Directorate, Bina Nusantara University in online and free access mode.
Articles 478 Documents
Improving Scalability of Java Archive Search Engine through Recursion Conversion And Multithreading Karnalim, Oscar
CommIT (Communication and Information Technology) Journal Vol 10, No 1 (2016): CommIT Vol. 10 No. 1 Tahun 2016
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/commit.v10i1.1653

Abstract

Based on the fact that bytecode always exists on Java archive, a bytecode based Java archive search engine had been developed [1, 2]. Although this system is quite effective, it still lack of scalability since many modules apply recursive calls and this system only utilizes one core (single thread). In this research, Java archive search engine architecture is redesigned in order to improve its scalability. All recursion are converted to iterative forms although most of these modules are logically recursive and quite difficult to convert (e.g. Tarjan’s strongly connected component algorithm). Recursion conversion can be conducted by following its respective recursive pattern. Each recursion is broke down to four parts (before and after actions of current and its children) and converted to iteration with the help of caller reference. This conversion mechanism improves scalability by avoiding stack overflow error caused by method calls. System scalability is also improved by applying multithreading mechanism which successfully cut off its processing time. Shorter processing time may enable system to handle larger data. Multithreading is applied on major parts which are indexer, vector space model (VSM) retriever, low-rank vector space model (LRVSM) retriever, and semantic relatedness calculator (semantic relatedness calculator also involves multiprocess). The correctness of both recursion conversion and multithread design are proved by the fact that all implementation yield similar result.
Industry, Brand, and the Role of Digital Medium Adinugroho, Indro; Hersanto, Didit; Putri, Antonina Renata; Hartanto, Steffi; Sjahputri, Smitha
CommIT (Communication and Information Technology) Journal Vol 12, No 1 (2018): CommIT Vol. 12 No. 1 Tahun 2018
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/commit.v12i1.3925

Abstract

Rapid growth in information technology forces various industries and business owners to think strategically to reach public attention. This condition also brings the logical consequence of using online medium as their primary marketing tools. Various online medium or usually called as social media such as Twitter, Path, and Facebook have been used by numerous industries as tools to communicate their ideas, brands, and promotion to the public. Along with this condition, industries need to think strategically to develop contemporary marketing communication strategy. This research is a case analysis focusing on examining marketing communication strategy of a brand. One brand identified is Pocari Sweat, Japanese isotonic drink brand. This brand is selected due to the availability of our computer devices to track the tweets. From this study, we have concluded that in this disruption era, marketing communication strategy can be known and identified by others only by tracking their digital footprint.
The Influence of Customers Communication Behaviour in the Implementation of 21cineplex Viral Marketing Using the Social Networking Site Facebook -, Meyliana; E.W., Henry Antonius; Santoso, Stephen W.
CommIT (Communication and Information Technology) Journal Vol 9, No 1 (2015): CommIT Vol. 9 No. 1 Tahun 2015
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/commit.v9i1.1643

Abstract

Application of viral marketing through social networking sites will greatly help companies in saving high marketing costs since companies do not have to give financial incentive to internet users or customers who voluntarily forward the information about the companies. Good marketing communication strategy will increase the company's branding and enable good interaction between customers and companies. This research to look if the customer communication behavior has a relationship and a significant impact on forwarding online content and whether the curiosity variable has a relationship and a significant impact on the variable of consumption of online content in the application of Viral Marketing. The methodology used is interpersonal communication model adopted from FIRO theory, which consists of the following variables: inclusion-need to belong, inclusion-individuation, affection-altruism, control-personal growth, and consumption of online content, towardthe online content forwarding variable; and also the curiosity variable towards the consumption of online content variable, where the hypothesis was tested by the correlation and regression analysis. The test results based on correlation analysis show that all H1hypotheses (have relation) are received; and based on regression analysis, all H1hypotheses (effect) are received, although the value of r and the effect is less significant (small).
Use of Data Mining for Prediction of Customer Loyalty Wijaya, Andri; Girsang, Abba Suganda
CommIT (Communication and Information Technology) Journal Vol 10, No 1 (2016): CommIT Vol. 10 No. 1 Tahun 2016
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/commit.v10i1.1660

Abstract

This  article  discusses  the  analysis  of  customer  loyalty  using  three  data  mining  methods:  C4.5,Naive Bayes, and Nearest Neighbor Algorithms and real-world  empirical  data.  The  data  contain  ten  attributes related to the customer loyalty and are obtained from a national  multimedia  company  in  Indonesia.  The  dataset contains 2269 records. The study also evaluates the effects of  the  size  of  the  training  data  to  the  accuracy  of  the classification.  The  results  suggest  that  C4.5  algorithm produces   highest classification   accuracy   at   the   order of  81%  followed  by  the  methods  of  Naive  Bayes  76% and  Nearest  Neighbor  55%.  In  addition,  the  numerical evaluation  also  suggests  that  the  proportion  of  80%  is optimal  for  the  training  set.
Digital Technology: the Effect of Connected World to Computer Ethic and Family Soewito, Benfano; Isa, Sani Muhamad
CommIT (Communication and Information Technology) Journal Vol 9, No 1 (2015): CommIT Vol. 9 No. 1 Tahun 2015
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/commit.v9i1.1654

Abstract

The development of digital technology such as smartphones, tablets and other gadgets grows very rapidly in the last decade so does the development of mobile applications for those mobile systems or smartphones. Unfortunately, those applications often do not specify the age range for their users. This is actually a problem in the world of digital technology and software development. It is not yet known whether the applications is good be used for children or not. Nowadays, parents are faced with the dilemma of allowing their children to use these modern gadgets, which often lead to serious addiction or keeping them in the dark and risk raising ignorant kids. This research shows 80% of respondents agree or strongly agree that the gadget will affect to the development of children social skill. Therefore, in this research, the framework for ethical assessment is introduced and it can be applied to digital technology included gadget and its application in order to mitigate the negative effect of digital technology and gadgets.
Implementation of Real-Time Static Hand Gesture Recognition Using Artificial Neural Network Yusnita, Lita; Rosalina, Rosalina; Roestam, Rusdianto; Wahyu, R. B.
CommIT (Communication and Information Technology) Journal Vol 11, No 2 (2017): CommIT Vol. 11 No. 2 Tahun 2017
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/commit.v11i2.2282

Abstract

This paper implements static hand gesture recognition in recognizing the alphabetical sign from “A” to “Z”, number from “0” to “9”, and additional punctuation mark such as “Period”, “Question Mark”, and “Space” in Sistem Isyarat Bahasa Indonesia (SIBI). Hand gestures are obtained by evaluating the contourrepresentation from image segmentation of the glove wore by user. Then, it is classified using Artificial Neural Network (ANN) based on the training model previously built from 100 images for each gesture. The accuracy rate of hand gesture translation is calculated to be 90%. Moreover, speech translation recognizes NATO phonetic letter as the speech input for translation.
Segmentation of Overlapping Cervical Cells in Normal Pap Smear Images Using Distance-Metric and Morphological Operation Kurniawan, Rahadian; Muhimmah, Izzati; Kurniawardhani, Arrie; Indrayanti, Indrayanti
CommIT (Communication and Information Technology) Journal Vol 11, No 1 (2017): CommIT Vol. 11 No. 1 Tahun 2017
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/commit.v11i1.1957

Abstract

The automatic interpretation of Pap Smear image is one of challenging issues in some aspects. Accurate segmentation for each cell is an important procedurethat must be done so that no information is lost during the evaluation process. However, the presence of overlapping cells in Pap Smear image make the automated analysis of these cytology images become more difficult. In most ofthe studies, cytoplasm segmentation is the difficult stage because the boundaries between cells are very thin. In this study, we propose an algorithm that can segment the overlapping cytoplasm. First, the morphology operation and global thresholding to segment cytoplasm is done. Second, the overlapping area on cytoplasm region is separated using morphological operation and distance criteria on each pixel. The proposed method has been evaluated against the results of manual tracing by experts. The experiment results show that the proposed method can segment the overlapping cytoplasm as similar as experts do, i.e., 2:897 3:632 (mean std) using Hausdorff distance.
Implementation of RSA 2048-bit and AES 256-bit with Digital Signature for Secure Electronic Health Record Application Sadikin, Mohamad Ali; Wardhani, Rini Wisnu
CommIT (Communication and Information Technology) Journal Vol 10, No 2 (2016): CommIT Vol. 10 No. 2 Tahun 2016
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/commit.v10i2.1549

Abstract

This research addresses the implementation of encryption and digital signature technique for electronic health record to prevent cybercrime such as robbery, modification and unauthorised access. In this research, RSA 2048-bit algorithm, AES 256-bit and SHA 256 will be implemented in Java programming language. Secure Electronic Health Record Information (SEHR) application design is intended to combine given services, such as confidentiality, integrity, authentication, and nonrepudiation. Cryptography is used to ensure the file records and electronic documents for detailed information on the medical past, present and future forecasts that have been given only to the intended patients. The document will be encrypted using an encryption algorithm based on NIST Standard. In the application, there are two schemes, namely the protection and verification scheme. This research uses black-box testing and whitebox testing to test the software input, output, and code without testing the process and design that occurs in the system.We demonstrated the implementation of cryptography in SEHR. The implementation of encryption and digital signature in this research can prevent archive thievery.
Power System Stabilizer Design Based on a Particle Swarm Optimization Multiobjective Function Implemented Under Graphical Interface Eddine, Ghouraf Djamel
CommIT (Communication and Information Technology) Journal Vol 10, No 1 (2016): CommIT Vol. 10 No. 1 Tahun 2016
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/commit.v10i1.1656

Abstract

Power system stability considered a necessary condition for normal functioning of an electrical network. The role of regulation and control systems is to ensure that stability by determining the essential elements that influence it. This paper proposes a Particle Swarm Optimization (PSO) based multiobjective function to tuning optimal parameters of Power System Stabilizer (PSS); this later is used as auxiliary to generator excitation system in order to damp electro mechanicals oscillations of the rotor and consequently improve Power system stability. The computer simulation results obtained by developed graphical user interface (GUI) have proved the efficiency of PSS optimized by a Particle Swarm Optimization, in comparison with a conventional PSS, showing stable   system   responses   almost   insensitive   to   large parameter variations.Our present study was performed using a GUI realized under MATLAB in our work.
The Accountant Satisfaction in Using ERP Systems Weli, Weli
CommIT (Communication and Information Technology) Journal Vol 12, No 1 (2018): CommIT Vol. 12 No. 1 Tahun 2018
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/commit.v12i1.4242

Abstract

Although studies of the benefits of Enterprise Resource Planning (ERP) have been done before, the analysis of accountant satisfaction models in using ERP systems has not been explored specifically from the perceptions of accounting benefits, operational benefits, individual productivity, and managerial benefits. There has been significant growth in the use of ERP systems in Indonesia. Therefore, this study proposes a model of the accountant satisfaction in using the ERP systems. The population of this study is the accountants working in Jakarta. The data are collected from ERP users in several companies in Jakarta by using a questionnaire with snowball sampling method. As much as 282 respondents return the questionnaire. The analysis of the proposed model is done by Partial Least Square (PLS). The results of the analysis provide support to the proposed model that accounting benefits, operational benefits, individual productivity, and managerial benefits are indicators that measure user satisfaction of ERP systems. The expected theoretical contribution of the results of this study is to provide insight into the system user satisfaction model, apart from the practical contribution for ERP provider companies for paying attention to the factors affecting ERP user satisfaction.

Filter by Year

2007 2025


Filter By Issues
All Issue Vol. 19 No. 1 (2025): CommIT Journal (in press) Vol. 18 No. 2 (2024): CommIT Journal Vol. 18 No. 1 (2024): CommIT Journal Vol. 17 No. 2 (2023): CommIT Journal Vol. 17 No. 1 (2023): CommIT Journal (In Press) Vol. 17 No. 1 (2023): CommIT Journal Vol. 16 No. 2 (2022): CommIT Journal Vol. 16 No. 1 (2022): CommIT Journal Vol. 15 No. 2 (2021): CommIT Journal Vol. 15 No. 1 (2021): CommIT Journal Vol 14, No 2 (2020): CommIT Vol. 14 No. 2 Tahun 2020 (IN PRESS) Vol 14, No 1 (2020): CommIT Vol. 14 No. 1 Tahun 2020 Vol. 14 No. 2 (2020): CommIT Journal Vol. 14 No. 1 (2020): CommIT Journal Vol 13, No 2 (2019): CommIT Vol. 13 No. 2 Tahun 2019 Vol 13, No 1 (2019): CommIT Vol. 13 No. 1 Tahun 2019 Vol. 13 No. 2 (2019): CommIT Journal Vol. 13 No. 1 (2019): CommIT Journal Vol 12, No 2 (2018): CommIT Vol. 12 No. 2 Tahun 2018 Vol 12, No 1 (2018): CommIT Vol. 12 No. 1 Tahun 2018 Vol. 12 No. 2 (2018): CommIT Journal Vol. 12 No. 1 (2018): CommIT Journal Vol 11, No 2 (2017): CommIT Vol. 11 No. 2 Tahun 2017 Vol 11, No 1 (2017): CommIT Vol. 11 No. 1 Tahun 2017 Vol. 11 No. 2 (2017): CommIT Journal Vol. 11 No. 1 (2017): CommIT Journal Vol 10, No 2 (2016): CommIT Vol. 10 No. 2 Tahun 2016 Vol 10, No 1 (2016): CommIT Vol. 10 No. 1 Tahun 2016 Vol. 10 No. 2 (2016): CommIT Journal Vol. 10 No. 1 (2016): CommIT Journal Vol 9, No 2 (2015): CommIT Vol. 9 No. 2 Tahun 2015 Vol 9, No 1 (2015): CommIT Vol. 9 No. 1 Tahun 2015 Vol. 9 No. 2 (2015): CommIT Journal Vol. 9 No. 1 (2015): CommIT Journal Vol 8, No 2 (2014): CommIT Vol. 8 No. 2 Tahun 2014 Vol 8, No 1 (2014): CommIT Vol. 8 No. 1 Tahun 2014 Vol. 8 No. 2 (2014): CommIT Journal Vol. 8 No. 1 (2014): CommIT Journal Vol 7, No 2 (2013): CommIT Vol.7 No. 2 Tahun 2013 Vol 7, No 1 (2013): CommIT Vol. 7 No. 1 Tahun 2013 Vol. 7 No. 2 (2013): CommIT Journal Vol. 7 No. 1 (2013): CommIT Journal Vol 6, No 2 (2012): CommIT Vol. 6 No. 2 Tahun 2012 Vol 6, No 1 (2012): CommIT Vol. 6 No. 1 Tahun 2012 Vol. 6 No. 2 (2012): CommIT Journal Vol. 6 No. 1 (2012): CommIT Journal Vol 5, No 2 (2011): CommIT Vol. 5 No. 2 Tahun 2011 Vol 5, No 1 (2011): CommIT Vol. 5 No. 1 Tahun 2011 Vol. 5 No. 2 (2011): CommIT Journal Vol. 5 No. 1 (2011): CommIT Journal Vol 4, No 2 (2010): CommIT Vol. 4 No. 2 Tahun 2010 Vol 4, No 1 (2010): CommIT Vol. 4 No. 1 Tahun 2010 Vol. 4 No. 2 (2010): CommIT Journal Vol. 4 No. 1 (2010): CommIT Journal Vol 3, No 2 (2009): CommIT Vol. 3 No. 2 Tahun 2009 Vol 3, No 1 (2009): CommIT Vol. 3 No. 1 Tahun 2009 Vol. 3 No. 2 (2009): CommIT Journal Vol. 3 No. 1 (2009): CommIT Journal Vol 2, No 2 (2008): CommIT Vol. 2 No. 2 Tahun 2008 Vol 2, No 1 (2008): CommIT Vol. 2 No. 1 Tahun 2008 Vol. 2 No. 2 (2008): CommIT Journal Vol. 2 No. 1 (2008): CommIT Journal Vol 1, No 2 (2007): CommIT Vol. 1 No. 2 Tahun 2007 Vol 1, No 1 (2007): CommIT Vol. 1 No. 1 Tahun 2007 Vol. 1 No. 2 (2007): CommIT Journal Vol. 1 No. 1 (2007): CommIT Journal More Issue