cover
Contact Name
Fergyanto F. Gunawan
Contact Email
fgunawan@binus.edu
Phone
+62215345830
Journal Mail Official
-
Editorial Address
Jl. Kebun Jeruk Raya No. 27, Kemanggisan / Palmerah Jakarta Barat 11530
Location
Kota adm. jakarta barat,
Dki jakarta
INDONESIA
CommIT (Communication & Information Technology)
ISSN : 19792484     EISSN : 24607010     DOI : -
Core Subject : Science,
Journal of Communication and Information Technology (CommIT) focuses on various issues spanning: software engineering, mobile technology and applications, robotics, database system, information engineering, artificial intelligent, interactive multimedia, computer networking, information system audit, accounting information system, information technology investment, information system development methodology, strategic information system (business intelligence, decision support system, executive information system, enterprise system, knowledge management), e-learning, and e-business (e-health, e-commerce, e-supply chain management, e-customer relationship management, e-marketing, and e-government). The journal is published in affiliation with Research Directorate, Bina Nusantara University in online and free access mode.
Articles 478 Documents
The Performance of Boolean Retrieval and Vector Space Model in Textual Information Retrieval Budi Yulianto; Widodo Budiharto; Iman Herwidiana Kartowisastro
CommIT (Communication and Information Technology) Journal Vol. 11 No. 1 (2017): CommIT Journal
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/commit.v11i1.2108

Abstract

Boolean Retrieval (BR) and Vector Space Model (VSM) are very popular methods in information retrieval for creating an inverted index and querying terms. BR method searches the exact results of the textual information retrieval without ranking the results. VSM method searches and ranks the results. This study empirically compares the two methods. The research utilizes a sample of the corpus data obtained from Reuters. The experimental results show that the required times to produce an inverted index by the two methods are nearly the same. However, a difference exists on the querying index. The results also show that the numberof generated indexes, the sizes of the generated files, and the duration of reading and searching an index are proportional with the file number in the corpus and thefile size.
Implementation of Real-Time Static Hand Gesture Recognition Using Artificial Neural Network Lita Yusnita; Rosalina Rosalina; Rusdianto Roestam; R. B. Wahyu
CommIT (Communication and Information Technology) Journal Vol. 11 No. 2 (2017): CommIT Journal
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/commit.v11i2.2282

Abstract

This paper implements static hand gesture recognition in recognizing the alphabetical sign from “A” to “Z”, number from “0” to “9”, and additional punctuation mark such as “Period”, “Question Mark”, and “Space” in Sistem Isyarat Bahasa Indonesia (SIBI). Hand gestures are obtained by evaluating the contourrepresentation from image segmentation of the glove wore by user. Then, it is classified using Artificial Neural Network (ANN) based on the training model previously built from 100 images for each gesture. The accuracy rate of hand gesture translation is calculated to be 90%. Moreover, speech translation recognizes NATO phonetic letter as the speech input for translation.
The Effectiveness of a Program Visualization Tool on Introductory Programming: A Case Study with PythonTutor Oscar Karnalim; Mewati Ayub
CommIT (Communication and Information Technology) Journal Vol. 11 No. 2 (2017): CommIT Journal
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/commit.v11i2.3704

Abstract

Program Visualization (PV) is an educational tool frequently used to assist users for understanding a program flow. However, despite its clear benefits, PV cannot be incorporated easily on Introductory Programming course. Several key properties such as student characteristics and behavior should be considered beforehand. This paper is intended to provide an empirical review about the impact of PV toward students of Introductory Programming course. For our case study, PythonTutor is selected as a sample of PVs due to its accessibility. It can be accessed anywhere and anytime through a web browser. Three conclusions are obtained based on our evaluation on data collected from a survey. Firstly, PV is quite effective to assist students for conducting several programming sub-tasks. Secondly, PV, at some extent, may help students to learn advanced topics on Introductory Programming course. Finally, despite the fact that several features should be incorporated to enhance understanding of students, PV is beneficial for learning Introductory Programming course, especially when it is frequently used.
Feature Image Watermarking Based on Bicubic Interpolation of Wavelet Coefficients Using CRT Prajanto Wahyu Adi; Yani Parti Astuti; Egia Rosi Subhiyakto
CommIT (Communication and Information Technology) Journal Vol. 11 No. 2 (2017): CommIT Journal
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/commit.v11i2.3870

Abstract

The main objective of watermarking method is to improve the robustness and imperceptibility. This paper introduces an improved CRT watermarking method using absolute value of interpolated wavelet coefficients aiming to improve the imperceptibility and robustness. The standard CRT method embeds the watermark bits on the blocks of pixels evenly. Hence, it can significantly reduce the quality of watermarked images when the watermark lies on the homogeneous area. Otherwise, the proposed method is embedding the watermark bits on the heterogeneous area by sorting the absolute magnitude of wavelet coefficients descending. The waveletcoefficients are selected from high frequency wavelet sub band HH. This scheme is able to determine the appropriate embedding location in certain range of value. The watermark bits are then embedding on the selectedpixel value using CRT scheme. The result shows that the average imperceptibility value the CRT is 0.9980 while the proposed method has average value of 0.9993. On robustness against compression, the proposed method achieves better result compared to the CRT with the average NC values of 0.7916 higher than the CRT value of 0.7530. These prove that the proposed method has better performance in term of imperceptibility and robustness against compression than the CRT method.
Network Security Analysis in Vanet Against Black Hole and Jellyfish Attack with Intrusion Detection System Algorithm Elsa Mustikawati; Doan Perdana; Ridha Muldina Negara
CommIT (Communication and Information Technology) Journal Vol. 11 No. 2 (2017): CommIT Journal
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/commit.v11i2.3886

Abstract

VANET is the key to the Intelligent Transportation Systems (ITS), where vehicles can communicate with others to exchange information in real time. VANET is an ad-hoc that has no fixed infrastructure and rapidly changing network topology. As the result, the network is insecure and vulnerable to various attacks both from within and outside the network. This research analyzes AODV routing protocol comparing the conditions without the attacks and with the attacks with the of black hole and jellyfish using the algorithm of Intrusion Detection System with the number of nodes changing from 10 to 100 nodes at the change speeds of 70, 80, 90, 100, 110, and 120 km/h. This research is simulated using Network Simulator 2 to model the network and ONESimulator to model node mobility. The analyzed QoS parameters are packet delivery ratio (PDR), throughput, and end-to-end delay. The results of the simulation show that changing the number of nodes and node velocity affects the performance in the network. On the number of nodes scenario with attacks, the average value of PDR decreases by 48.03%, throughput decreases by 50.23%, and delay, for black hole, decreases by 80.18% but increases by 47.87% for jellyfish. Whereas in the node velocity scenario, the average values of PDR, throughput, and delay decrease by 58.52%, 60.34%, 13.81% for blackhole attack, respectively. However, the delay increases by 123.91% for jellyfish attack.
Study of User Acceptance and Satisfaction of a Mandatory Government-Regulated Information System Tony Wibowo
CommIT (Communication and Information Technology) Journal Vol. 11 No. 1 (2017): CommIT Journal
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/commit.v11i1.3896

Abstract

This paper discusses the user acceptance of a mandatory government-regulated information system. The issue is investigated by using a modified UTAUTframework. From random sample data of 65 respondents, a regression model is established from which the conclusion is drawn. The study concludes that theaspects of performance expectancy, effort expectancy, social influence, and information system quality affect the user acceptance. The four aspects are equally important.
Performance Analysis on IEEE 802.11ah Standard with Enhanced Distributed Channel Access Mechanism Ana Oktaviana; Doan Perdana; Ridha Muldina Negara
CommIT (Communication and Information Technology) Journal Vol. 12 No. 1 (2018): CommIT Journal
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/commit.v12i1.3908

Abstract

IEEE 802.11ah is a new task group on the IEEE 802.11 standard designed to work on the 900 MHz. It is with a range of communication coverage up to 1kilometer, lower energy consumption, and up to 8191 stations. There are two types of STAs in 802.11ah: sensor type to support sensor service and non-sensor type for offload service. In this research, it only focuses on non-sensor STA. For non-sensor STA, maximizing throughput is more important than power consumption. This research aims to see the performance of IEEE 802.1 1ah with Enhanced Distributed Channel Access (EDCA). To achieve that purpose, a mechanism is needed to provide guarantees various services required by theSTA. EDCA is an access mechanism used to set the Quality of Service (QoS) for the IEEE 802.11 standard through modifications in MAC layer. In this research,it focuses on one of the EDCA parameters, Arbitration Inter-Frame Space (AIFS). In addition, this research also focuses on the 802.11ah feature is Restricted Access Window (RAW) by changing the number of the RAW groups. From the results of the research, it is found that the improvement scheme with Arbitration Inter-Frame Space Number (AIFSN) value AC BK = 2, AC BE = 1, AC VI = 1, AC VO = 1 has better performance compared to the default scheme with AIFSN value AC BK = 7, AC BE = 3, AC VI = 2, AC VO = 2) with an average throughput of 1.504598 Mbps, average overall delay of 0.066242 second and average PDR of 62%. In addition, changes in the number of RAW groups and RAW slots affect network performance. This feature can improve the value of throughput, average delay, and Packet Delivery Ratio. The goals of this research is to know the effect of AIFSN value changes on AIFSN parameters, variation of RAW group and RAW slot number to throughput,average delay and packet delivery ratio.
Industry, Brand, and the Role of Digital Medium Indro Adinugroho; Didit Hersanto; Antonina Renata Putri; Steffi Hartanto; Smitha Sjahputri
CommIT (Communication and Information Technology) Journal Vol. 12 No. 1 (2018): CommIT Journal
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/commit.v12i1.3925

Abstract

Rapid growth in information technology forces various industries and business owners to think strategically to reach public attention. This condition also brings the logical consequence of using online medium as their primary marketing tools. Various online medium or usually called as social media such as Twitter, Path, and Facebook have been used by numerous industries as tools to communicate their ideas, brands, and promotion to the public. Along with this condition, industries need to think strategically to develop contemporary marketing communication strategy. This research is a case analysis focusing on examining marketing communication strategy of a brand. One brand identified is Pocari Sweat, Japanese isotonic drink brand. This brand is selected due to the availability of our computer devices to track the tweets. From this study, we have concluded that in this disruption era, marketing communication strategy can be known and identified by others only by tracking their digital footprint.
Performance of Clustering on ANFIS for Weather Forecasting Candra Dewi
CommIT (Communication and Information Technology) Journal Vol. 12 No. 1 (2018): CommIT Journal
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/commit.v12i1.3941

Abstract

This paper proposes the comparison of using K-Means and Fuzzy C-Means (FCM) to optimize the premise parameters on Adaptive Neuro-Fuzzy Inference System (ANFIS) for weather forecasting. The ANFIS architecture groups each of the feature inputs in the first layer into three clusters, and uses three rules for the second layer. The comparison is performed based on the RMSE value and the number of iteration. The testing is done on the percentage of 40%, 50%, and 60% of the total data. In addition, the testing is done by grouping the data based on season called rainy and dry seasons. The testing results show that both K-Means and FCM havealmost the same RMSE, except for rainy season where K-Means has better RMSE. However, K-Means requires relatively more iterations to achieve convergence. The use of FCM, in general, gives better results than K-Means. It is also shown that ANFIS provides the best performance for data onto the dry season.
Development of Game for Self-Help Toilet Learning for Children with Autism Rahadian Kurniawan; Wuriandietry Mayang Purnamasari; Restu Rakhmawati; Dimas Panji Eka Jalaputra
CommIT (Communication and Information Technology) Journal Vol. 12 No. 1 (2018): CommIT Journal
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/commit.v12i1.4112

Abstract

This study aims to develop a video game for toilet training materials as a medium for self-help learning for children with autism. Toileting skill is one of the basic self-help skills that children should master. In fact, teaching new things to children with autism is challenging. It requires a proper method to deliver the materials to these children. One of the effective learning media to teach self-help is to use visual media like video games. By using video games, children are expected to play and learn self-help skills, particularly about toileting. In addition, the video game is developed by applying certain design principles that fit with the needs of children with autism. The software is tested for its functionalities. Moreover, an implementation test is done by using observation communication analysis. Based on the results, the researchers conclude that the developed video game has implemented the proper design and materials related to toileting in accordance with the needs of children with autism. The respondents show positive results for using the video game.

Filter by Year

2007 2025


Filter By Issues
All Issue Vol. 19 No. 1 (2025): CommIT Journal (in press) Vol. 18 No. 2 (2024): CommIT Journal Vol. 18 No. 1 (2024): CommIT Journal Vol. 17 No. 2 (2023): CommIT Journal Vol. 17 No. 1 (2023): CommIT Journal Vol. 17 No. 1 (2023): CommIT Journal (In Press) Vol. 16 No. 2 (2022): CommIT Journal Vol. 16 No. 1 (2022): CommIT Journal Vol. 15 No. 2 (2021): CommIT Journal Vol. 15 No. 1 (2021): CommIT Journal Vol 14, No 2 (2020): CommIT Vol. 14 No. 2 Tahun 2020 (IN PRESS) Vol 14, No 1 (2020): CommIT Vol. 14 No. 1 Tahun 2020 Vol. 14 No. 2 (2020): CommIT Journal Vol. 14 No. 1 (2020): CommIT Journal Vol 13, No 2 (2019): CommIT Vol. 13 No. 2 Tahun 2019 Vol 13, No 1 (2019): CommIT Vol. 13 No. 1 Tahun 2019 Vol. 13 No. 2 (2019): CommIT Journal Vol. 13 No. 1 (2019): CommIT Journal Vol 12, No 2 (2018): CommIT Vol. 12 No. 2 Tahun 2018 Vol 12, No 1 (2018): CommIT Vol. 12 No. 1 Tahun 2018 Vol. 12 No. 2 (2018): CommIT Journal Vol. 12 No. 1 (2018): CommIT Journal Vol 11, No 2 (2017): CommIT Vol. 11 No. 2 Tahun 2017 Vol 11, No 1 (2017): CommIT Vol. 11 No. 1 Tahun 2017 Vol. 11 No. 2 (2017): CommIT Journal Vol. 11 No. 1 (2017): CommIT Journal Vol 10, No 2 (2016): CommIT Vol. 10 No. 2 Tahun 2016 Vol 10, No 1 (2016): CommIT Vol. 10 No. 1 Tahun 2016 Vol. 10 No. 2 (2016): CommIT Journal Vol. 10 No. 1 (2016): CommIT Journal Vol 9, No 2 (2015): CommIT Vol. 9 No. 2 Tahun 2015 Vol 9, No 1 (2015): CommIT Vol. 9 No. 1 Tahun 2015 Vol. 9 No. 2 (2015): CommIT Journal Vol. 9 No. 1 (2015): CommIT Journal Vol 8, No 2 (2014): CommIT Vol. 8 No. 2 Tahun 2014 Vol 8, No 1 (2014): CommIT Vol. 8 No. 1 Tahun 2014 Vol. 8 No. 2 (2014): CommIT Journal Vol. 8 No. 1 (2014): CommIT Journal Vol 7, No 2 (2013): CommIT Vol.7 No. 2 Tahun 2013 Vol 7, No 1 (2013): CommIT Vol. 7 No. 1 Tahun 2013 Vol. 7 No. 2 (2013): CommIT Journal Vol. 7 No. 1 (2013): CommIT Journal Vol 6, No 2 (2012): CommIT Vol. 6 No. 2 Tahun 2012 Vol 6, No 1 (2012): CommIT Vol. 6 No. 1 Tahun 2012 Vol. 6 No. 2 (2012): CommIT Journal Vol. 6 No. 1 (2012): CommIT Journal Vol 5, No 2 (2011): CommIT Vol. 5 No. 2 Tahun 2011 Vol 5, No 1 (2011): CommIT Vol. 5 No. 1 Tahun 2011 Vol. 5 No. 2 (2011): CommIT Journal Vol. 5 No. 1 (2011): CommIT Journal Vol 4, No 2 (2010): CommIT Vol. 4 No. 2 Tahun 2010 Vol 4, No 1 (2010): CommIT Vol. 4 No. 1 Tahun 2010 Vol. 4 No. 2 (2010): CommIT Journal Vol. 4 No. 1 (2010): CommIT Journal Vol 3, No 2 (2009): CommIT Vol. 3 No. 2 Tahun 2009 Vol 3, No 1 (2009): CommIT Vol. 3 No. 1 Tahun 2009 Vol. 3 No. 2 (2009): CommIT Journal Vol. 3 No. 1 (2009): CommIT Journal Vol 2, No 2 (2008): CommIT Vol. 2 No. 2 Tahun 2008 Vol 2, No 1 (2008): CommIT Vol. 2 No. 1 Tahun 2008 Vol. 2 No. 2 (2008): CommIT Journal Vol. 2 No. 1 (2008): CommIT Journal Vol 1, No 2 (2007): CommIT Vol. 1 No. 2 Tahun 2007 Vol 1, No 1 (2007): CommIT Vol. 1 No. 1 Tahun 2007 Vol. 1 No. 2 (2007): CommIT Journal Vol. 1 No. 1 (2007): CommIT Journal More Issue