cover
Contact Name
Fergyanto F. Gunawan
Contact Email
fgunawan@binus.edu
Phone
+62215345830
Journal Mail Official
-
Editorial Address
Jl. Kebun Jeruk Raya No. 27, Kemanggisan / Palmerah Jakarta Barat 11530
Location
Kota adm. jakarta barat,
Dki jakarta
INDONESIA
CommIT (Communication & Information Technology)
ISSN : 19792484     EISSN : 24607010     DOI : -
Core Subject : Science,
Journal of Communication and Information Technology (CommIT) focuses on various issues spanning: software engineering, mobile technology and applications, robotics, database system, information engineering, artificial intelligent, interactive multimedia, computer networking, information system audit, accounting information system, information technology investment, information system development methodology, strategic information system (business intelligence, decision support system, executive information system, enterprise system, knowledge management), e-learning, and e-business (e-health, e-commerce, e-supply chain management, e-customer relationship management, e-marketing, and e-government). The journal is published in affiliation with Research Directorate, Bina Nusantara University in online and free access mode.
Articles 478 Documents
Information Technology Service Management with Cloud Computing Approach to Improve Administration System and Online Learning Performance Wilianto, Wilianto; Fitri, Iskandar
CommIT (Communication and Information Technology) Journal Vol 9, No 2 (2015): CommIT Vol. 9 No. 2 Tahun 2015
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/commit.v9i2.1655

Abstract

This work discusses the development of information technology service management using cloud computing approach to improve the performance of administration system and online learning at STMIK IBBI Medan, Indonesia. The network topology is modeled and simulated for system administration and online learning. The same network topology is developed in cloud computing using Amazon AWS architecture. The model is designed and modeled using Riverbed Academic Edition Modeler to obtain values of the parameters: delay, load, CPU utilization, and throughput. The simu- lation results are the following. For network topology 1, without cloud computing, the average delay is 54  ms, load 110 000 bits/s, CPU utilization 1.1%, and throughput 440  bits/s.  With  cloud  computing,  the  average  delay  is 45 ms,  load  2 800  bits/s,  CPU  utilization  0.03%,  and throughput 540 bits/s. For network topology 2, without cloud computing, the average delay is 39  ms, load 3 500 bits/s, CPU utilization 0.02%, and throughput database server 1 400 bits/s. With cloud computing, the average delay is 26 ms, load 5 400 bits/s, CPU utilization email server 0.0001%, FTP server 0.001%, HTTP server 0.0002%, throughput email server 85 bits/s, FTP    server 100 bits/sec, and HTTP server 95  bits/s.  Thus,  the  delay, the load, and the CPU utilization decrease; but,  the throughput increases. Information technology service management with cloud computing approach has better performance.
Socio-Technological Factors Influencing the Use of GSM in Communication and Sustainable Development in Nigeria Omiunu, Ojinga Gideon
CommIT (Communication and Information Technology) Journal Vol 11, No 2 (2017): CommIT Vol. 11 No. 2 Tahun 2017
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/commit.v11i2.2007

Abstract

The study investigates the influence of social and technological problems/factors and the use of GSM in communication towards ensuring sustainable development in Nigeria. The multi-stage sampling technique is used for this study. The local governments are divided into two major strata, and from each stratum, one local government is selected randomly. From the Ibadan-lesscity, Akinyele local government is selected, and from Ibadan urban, it is Ibadan North East. Also, since the population of GSM users are unknown, a convenientsampling technique is deployed to select 200 respondents. The result reveals that although GSM users are satisfied with the reliability of the communication by mobile phones, some problems exist. Those problems are network issues, inability to perceive what the person at the other end is doing, and mistrust and distrust among speakers. Those problems have affected the satisfaction and use of GSM. In addition, some personal, social, and technological factors influence the efficient and nonefficient use of GSM (p < 0:05). As a result, users deploy various strategies to ameliorate these problems. Finally, GSM use among mobile users has a significant effect on users development (p < 0:05), which can bepersonal or communal. It is recommended that telecommunication should upgrade the system to encourage good interpersonal communication among GSM users and also consider some personal and social factors to enhance theefficiency use of GSM that will have sustainable impact on lives.
Feature Extraction of Electroencephalography Signals Using Fast Fourier Transform Hindarto, Hindarto; Sumarno, Sumarno
CommIT (Communication and Information Technology) Journal Vol 10, No 2 (2016): CommIT Vol. 10 No. 2 Tahun 2016
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/commit.v10i2.1548

Abstract

This article discusses a method within the area of brain-computer interface. The proposed method is to use the features extracted from the Electroencephalograph signal and a three hidden-layer artificial neural network to map the brain signal features to the computer cursor movement. The evaluated features are the root mean square and the average power spectrum. The empirical evaluation using 200 records taken from 2003 BCI Competition dataset shows that the current approach can accurately classify a simple cursor movement within 92.5% accuracy in a short computation time.
Web-Based Implementation of E-Marketing to Support Product Marketing of Chemical Manufacturing Company Tarigan, Riswan Efendi; Dewi, Kartika Sari
CommIT (Communication and Information Technology) Journal Vol 9, No 2 (2015): CommIT Vol. 9 No. 2 Tahun 2015
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/commit.v9i2.1650

Abstract

Currently, many company’s marketing strategies are limited only to face-to-face communication, telephone, facsimile, company portfolio, and product brochures. However, those marketing strategies are well- known to have limited impacts. Therefore, the presence of e-marketing as one of the marketing strategies would be appropriate to cover the weaknesses and to solve a number of the marketing problems. The purpose of this study is to discuss matters related to marketing, such    as, proposing a marketing plan using website, expanding marketing segment, and introducing existing  products for a chemical manufacturing company. The adopted research method is a descriptive method where the study is directly performed on the research object to acquire necessary data. The collected data are further analyzed using the Porter’s Five Force and SWOT analysis. Fi- nally, the work provides a number of recommendations for implementing e-marketing strategies to support the company business.
Feature Image Watermarking Based on Bicubic Interpolation of Wavelet Coefficients Using CRT Adi, Prajanto Wahyu; Astuti, Yani Parti; Subhiyakto, Egia Rosi
CommIT (Communication and Information Technology) Journal Vol 11, No 2 (2017): CommIT Vol. 11 No. 2 Tahun 2017
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/commit.v11i2.3870

Abstract

The main objective of watermarking method is to improve the robustness and imperceptibility. This paper introduces an improved CRT watermarking method using absolute value of interpolated wavelet coefficients aiming to improve the imperceptibility and robustness. The standard CRT method embeds the watermark bits on the blocks of pixels evenly. Hence, it can significantly reduce the quality of watermarked images when the watermark lies on the homogeneous area. Otherwise, the proposed method is embedding the watermark bits on the heterogeneous area by sorting the absolute magnitude of wavelet coefficients descending. The waveletcoefficients are selected from high frequency wavelet sub band HH. This scheme is able to determine the appropriate embedding location in certain range of value. The watermark bits are then embedding on the selectedpixel value using CRT scheme. The result shows that the average imperceptibility value the CRT is 0.9980 while the proposed method has average value of 0.9993. On robustness against compression, the proposed method achieves better result compared to the CRT with the average NC values of 0.7916 higher than the CRT value of 0.7530. These prove that the proposed method has better performance in term of imperceptibility and robustness against compression than the CRT method.
The Performance of Boolean Retrieval and Vector Space Model in Textual Information Retrieval Yulianto, Budi; Budiharto, Widodo; Kartowisastro, Iman Herwidiana
CommIT (Communication and Information Technology) Journal Vol 11, No 1 (2017): CommIT Vol. 11 No. 1 Tahun 2017
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/commit.v11i1.2108

Abstract

Boolean Retrieval (BR) and Vector Space Model (VSM) are very popular methods in information retrieval for creating an inverted index and querying terms. BR method searches the exact results of the textual information retrieval without ranking the results. VSM method searches and ranks the results. This study empirically compares the two methods. The research utilizes a sample of the corpus data obtained from Reuters. The experimental results show that the required times to produce an inverted index by the two methods are nearly the same. However, a difference exists on the querying index. The results also show that the numberof generated indexes, the sizes of the generated files, and the duration of reading and searching an index are proportional with the file number in the corpus and thefile size.
A Study on Bipedal and Mobile Robot Behavior Through Modeling and Simulation Nirmala, Nirmala; Tanaya, Prianggada Indra; Sinaga, Maralo
CommIT (Communication and Information Technology) Journal Vol 9, No 1 (2015): CommIT Vol. 9 No. 1 Tahun 2015
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/commit.v9i1.1647

Abstract

The purpose of this work is to study and analyze mobile robot behavior. In performing this, a framework is adopted and developed for mobile and bipedal robot. The robots are design, build, and run as proceed from the development of mechanical structure, electronics and control integration, and control software application. The behavior of those robots are difficult to be observed and analyzed qualitatively. To evaluate the design and behavior quality, modeling and simulation of robot structure and its task capability is performed. The stepwise procedure to robot behavior study is explained. Behavior cases study are experimented to bipedal robots, transporter robot and Autonomous Guided Vehicle (AGV) developed at our institution. The experimentation are conducted on those robots by adjusting their dynamic properties and/or surrounding environment. Validation is performed by comparing the simulation result and the real robot execution. The simulation gives a more idealistic behavior execution rather than realistic one. Adjustments are performed to fine tuning simulation's parameters to provide a more realistic performance.
Optimization of the Bugs Classification of the Ticketing System in Software Development: a Study Case Ardhito, Danar; Girsang, Abba Suganda
CommIT (Communication and Information Technology) Journal Vol 10, No 2 (2016): CommIT Vol. 10 No. 2 Tahun 2016
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/commit.v10i2.1670

Abstract

Computer bug elimination is an important phase in the software development process. A ticketing system is usually used to classify the identified bug type and to assign a suitable developer. This system is handled manually and error prone. This paper proposes a new bug classification method using the fast string search algorithm. The method searches the error string and compares it to the full text. The approach is deployed to the software development process at PT. Selaras Anugerah Lestari and it results in a significant reduction in the average value of the time required to handle the bugs.
Does Internet Censorship Reduce Crime Rate? Karnadi, Erwin Bramana
CommIT (Communication and Information Technology) Journal Vol 9, No 1 (2015): CommIT Vol. 9 No. 1 Tahun 2015
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/commit.v9i1.1661

Abstract

The study examines the relationship between Internet censorship and crime rate. Classical  views  of censorship  suggest that filtering contents  that are per- ceived as negative such as violence and pornography  can have a negative impact on crime rate. However,  there is no evidence to suggest  any causal relationship  between censorship  and crime rate. The Internet has  made it easier for individuals  to access  any information  they want, and hence Internet Censorship  is applied  to filter contents that are deemed negative. We discussed several approaches that may be used to estimate the relationship between  Internet Censorship  and Crime Rate, and we decided  to use  OLS. We  found that Conflict Internet Censorship  is the only type of Internet censorship that has a significant negative impact on Crime Rate. Furthermore, it only significantly affects Crime Rate for highly educated countries.
Performance Analysis on IEEE 802.11ah Standard with Enhanced Distributed Channel Access Mechanism Oktaviana, Ana; Perdana, Doan; Negara, Ridha Muldina
CommIT (Communication and Information Technology) Journal Vol 12, No 1 (2018): CommIT Vol. 12 No. 1 Tahun 2018
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/commit.v12i1.3908

Abstract

IEEE 802.11ah is a new task group on the IEEE 802.11 standard designed to work on the 900 MHz. It is with a range of communication coverage up to 1kilometer, lower energy consumption, and up to 8191 stations. There are two types of STAs in 802.11ah: sensor type to support sensor service and non-sensor type for offload service. In this research, it only focuses on non-sensor STA. For non-sensor STA, maximizing throughput is more important than power consumption. This research aims to see the performance of IEEE 802.1 1ah with Enhanced Distributed Channel Access (EDCA). To achieve that purpose, a mechanism is needed to provide guarantees various services required by theSTA. EDCA is an access mechanism used to set the Quality of Service (QoS) for the IEEE 802.11 standard through modifications in MAC layer. In this research,it focuses on one of the EDCA parameters, Arbitration Inter-Frame Space (AIFS). In addition, this research also focuses on the 802.11ah feature is Restricted Access Window (RAW) by changing the number of the RAW groups. From the results of the research, it is found that the improvement scheme with Arbitration Inter-Frame Space Number (AIFSN) value AC BK = 2, AC BE = 1, AC VI = 1, AC VO = 1 has better performance compared to the default scheme with AIFSN value AC BK = 7, AC BE = 3, AC VI = 2, AC VO = 2) with an average throughput of 1.504598 Mbps, average overall delay of 0.066242 second and average PDR of 62%. In addition, changes in the number of RAW groups and RAW slots affect network performance. This feature can improve the value of throughput, average delay, and Packet Delivery Ratio. The goals of this research is to know the effect of AIFSN value changes on AIFSN parameters, variation of RAW group and RAW slot number to throughput,average delay and packet delivery ratio.

Filter by Year

2007 2025


Filter By Issues
All Issue Vol. 19 No. 1 (2025): CommIT Journal (in press) Vol. 18 No. 2 (2024): CommIT Journal Vol. 18 No. 1 (2024): CommIT Journal Vol. 17 No. 2 (2023): CommIT Journal Vol. 17 No. 1 (2023): CommIT Journal (In Press) Vol. 17 No. 1 (2023): CommIT Journal Vol. 16 No. 2 (2022): CommIT Journal Vol. 16 No. 1 (2022): CommIT Journal Vol. 15 No. 2 (2021): CommIT Journal Vol. 15 No. 1 (2021): CommIT Journal Vol 14, No 2 (2020): CommIT Vol. 14 No. 2 Tahun 2020 (IN PRESS) Vol 14, No 1 (2020): CommIT Vol. 14 No. 1 Tahun 2020 Vol. 14 No. 2 (2020): CommIT Journal Vol. 14 No. 1 (2020): CommIT Journal Vol 13, No 2 (2019): CommIT Vol. 13 No. 2 Tahun 2019 Vol 13, No 1 (2019): CommIT Vol. 13 No. 1 Tahun 2019 Vol. 13 No. 2 (2019): CommIT Journal Vol. 13 No. 1 (2019): CommIT Journal Vol 12, No 2 (2018): CommIT Vol. 12 No. 2 Tahun 2018 Vol 12, No 1 (2018): CommIT Vol. 12 No. 1 Tahun 2018 Vol. 12 No. 2 (2018): CommIT Journal Vol. 12 No. 1 (2018): CommIT Journal Vol 11, No 2 (2017): CommIT Vol. 11 No. 2 Tahun 2017 Vol 11, No 1 (2017): CommIT Vol. 11 No. 1 Tahun 2017 Vol. 11 No. 2 (2017): CommIT Journal Vol. 11 No. 1 (2017): CommIT Journal Vol 10, No 2 (2016): CommIT Vol. 10 No. 2 Tahun 2016 Vol 10, No 1 (2016): CommIT Vol. 10 No. 1 Tahun 2016 Vol. 10 No. 2 (2016): CommIT Journal Vol. 10 No. 1 (2016): CommIT Journal Vol 9, No 2 (2015): CommIT Vol. 9 No. 2 Tahun 2015 Vol 9, No 1 (2015): CommIT Vol. 9 No. 1 Tahun 2015 Vol. 9 No. 2 (2015): CommIT Journal Vol. 9 No. 1 (2015): CommIT Journal Vol 8, No 2 (2014): CommIT Vol. 8 No. 2 Tahun 2014 Vol 8, No 1 (2014): CommIT Vol. 8 No. 1 Tahun 2014 Vol. 8 No. 2 (2014): CommIT Journal Vol. 8 No. 1 (2014): CommIT Journal Vol 7, No 2 (2013): CommIT Vol.7 No. 2 Tahun 2013 Vol 7, No 1 (2013): CommIT Vol. 7 No. 1 Tahun 2013 Vol. 7 No. 2 (2013): CommIT Journal Vol. 7 No. 1 (2013): CommIT Journal Vol 6, No 2 (2012): CommIT Vol. 6 No. 2 Tahun 2012 Vol 6, No 1 (2012): CommIT Vol. 6 No. 1 Tahun 2012 Vol. 6 No. 2 (2012): CommIT Journal Vol. 6 No. 1 (2012): CommIT Journal Vol 5, No 2 (2011): CommIT Vol. 5 No. 2 Tahun 2011 Vol 5, No 1 (2011): CommIT Vol. 5 No. 1 Tahun 2011 Vol. 5 No. 2 (2011): CommIT Journal Vol. 5 No. 1 (2011): CommIT Journal Vol 4, No 2 (2010): CommIT Vol. 4 No. 2 Tahun 2010 Vol 4, No 1 (2010): CommIT Vol. 4 No. 1 Tahun 2010 Vol. 4 No. 2 (2010): CommIT Journal Vol. 4 No. 1 (2010): CommIT Journal Vol 3, No 2 (2009): CommIT Vol. 3 No. 2 Tahun 2009 Vol 3, No 1 (2009): CommIT Vol. 3 No. 1 Tahun 2009 Vol. 3 No. 2 (2009): CommIT Journal Vol. 3 No. 1 (2009): CommIT Journal Vol 2, No 2 (2008): CommIT Vol. 2 No. 2 Tahun 2008 Vol 2, No 1 (2008): CommIT Vol. 2 No. 1 Tahun 2008 Vol. 2 No. 2 (2008): CommIT Journal Vol. 2 No. 1 (2008): CommIT Journal Vol 1, No 2 (2007): CommIT Vol. 1 No. 2 Tahun 2007 Vol 1, No 1 (2007): CommIT Vol. 1 No. 1 Tahun 2007 Vol. 1 No. 2 (2007): CommIT Journal Vol. 1 No. 1 (2007): CommIT Journal More Issue