cover
Contact Name
Fergyanto F. Gunawan
Contact Email
fgunawan@binus.edu
Phone
+62215345830
Journal Mail Official
-
Editorial Address
Jl. Kebun Jeruk Raya No. 27, Kemanggisan / Palmerah Jakarta Barat 11530
Location
Kota adm. jakarta barat,
Dki jakarta
INDONESIA
CommIT (Communication & Information Technology)
ISSN : 19792484     EISSN : 24607010     DOI : -
Core Subject : Science,
Journal of Communication and Information Technology (CommIT) focuses on various issues spanning: software engineering, mobile technology and applications, robotics, database system, information engineering, artificial intelligent, interactive multimedia, computer networking, information system audit, accounting information system, information technology investment, information system development methodology, strategic information system (business intelligence, decision support system, executive information system, enterprise system, knowledge management), e-learning, and e-business (e-health, e-commerce, e-supply chain management, e-customer relationship management, e-marketing, and e-government). The journal is published in affiliation with Research Directorate, Bina Nusantara University in online and free access mode.
Articles 6 Documents
Search results for , issue "Vol. 11 No. 2 (2017): CommIT Journal" : 6 Documents clear
Socio-Technological Factors Influencing the Use of GSM in Communication and Sustainable Development in Nigeria Ojinga Gideon Omiunu
CommIT (Communication and Information Technology) Journal Vol. 11 No. 2 (2017): CommIT Journal
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/commit.v11i2.2007

Abstract

The study investigates the influence of social and technological problems/factors and the use of GSM in communication towards ensuring sustainable development in Nigeria. The multi-stage sampling technique is used for this study. The local governments are divided into two major strata, and from each stratum, one local government is selected randomly. From the Ibadan-lesscity, Akinyele local government is selected, and from Ibadan urban, it is Ibadan North East. Also, since the population of GSM users are unknown, a convenientsampling technique is deployed to select 200 respondents. The result reveals that although GSM users are satisfied with the reliability of the communication by mobile phones, some problems exist. Those problems are network issues, inability to perceive what the person at the other end is doing, and mistrust and distrust among speakers. Those problems have affected the satisfaction and use of GSM. In addition, some personal, social, and technological factors influence the efficient and nonefficient use of GSM (p < 0:05). As a result, users deploy various strategies to ameliorate these problems. Finally, GSM use among mobile users has a significant effect on users development (p < 0:05), which can bepersonal or communal. It is recommended that telecommunication should upgrade the system to encourage good interpersonal communication among GSM users and also consider some personal and social factors to enhance theefficiency use of GSM that will have sustainable impact on lives.
Interoperability and Reliability of Multiplatform MPLS VPN: Comparison of Traffic Engineering with RSVP-TE Protocol and LDP Protocol Nanang Ismail; Eki Ahmad Zaki; Muhamad Arghifary
CommIT (Communication and Information Technology) Journal Vol. 11 No. 2 (2017): CommIT Journal
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/commit.v11i2.2105

Abstract

One of the alternatives to overcome network scalability problem and maintaining reliability is using MPLS VPN network. In reallity, the current network is already using a multiplatform of several different hardware vendors, i.e., Cisco and Juniper platforms. This paper discusses the comparison of the simulation results to see interoperability of multiplatform MPLS VPN andreliability through traffic engineering using RSVP-TE and LDP protocols. Both the RSVP and LDP protocols are tested on a stable network and in a recovery mode,as well as non-load conditions and with additional traffic load. The recovery mode is the condition after the failover due to termination of one of the links in the network. The no-load condition means that the network is not filled with additional traffic. There is only traffic from the measurement activity itself. While network conditions with an additional load are conditions where there is an additional UDP packet traffic load of 4.5 Mbps in addition to the measurement load itself. On a stable network and without additional traffic load, the average delay on LDP protocol is 59.41 ms, 2.06 ms jitter, 0.08% packetloss, and 8.99 Mbps throughput. Meanwhile, on RSVP protocol, the average delay is 52.40 ms, 2.39 ms jitter, 12.18% packet loss, and 7.80 Mbps throughput. When failover occurs and on recovery mode, LDP protocol is48% of packet loss per 100 sent packets while on RSVP packet loss percentage is 35.5% per 100 sent packets. Both protocols have interoperability on the third layer of multiplatform MPLS VPN, but on heavy loaded traffic condition, RSVP protocol has better reliability than the LDP protocol.
Implementation of Real-Time Static Hand Gesture Recognition Using Artificial Neural Network Lita Yusnita; Rosalina Rosalina; Rusdianto Roestam; R. B. Wahyu
CommIT (Communication and Information Technology) Journal Vol. 11 No. 2 (2017): CommIT Journal
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/commit.v11i2.2282

Abstract

This paper implements static hand gesture recognition in recognizing the alphabetical sign from “A” to “Z”, number from “0” to “9”, and additional punctuation mark such as “Period”, “Question Mark”, and “Space” in Sistem Isyarat Bahasa Indonesia (SIBI). Hand gestures are obtained by evaluating the contourrepresentation from image segmentation of the glove wore by user. Then, it is classified using Artificial Neural Network (ANN) based on the training model previously built from 100 images for each gesture. The accuracy rate of hand gesture translation is calculated to be 90%. Moreover, speech translation recognizes NATO phonetic letter as the speech input for translation.
The Effectiveness of a Program Visualization Tool on Introductory Programming: A Case Study with PythonTutor Oscar Karnalim; Mewati Ayub
CommIT (Communication and Information Technology) Journal Vol. 11 No. 2 (2017): CommIT Journal
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/commit.v11i2.3704

Abstract

Program Visualization (PV) is an educational tool frequently used to assist users for understanding a program flow. However, despite its clear benefits, PV cannot be incorporated easily on Introductory Programming course. Several key properties such as student characteristics and behavior should be considered beforehand. This paper is intended to provide an empirical review about the impact of PV toward students of Introductory Programming course. For our case study, PythonTutor is selected as a sample of PVs due to its accessibility. It can be accessed anywhere and anytime through a web browser. Three conclusions are obtained based on our evaluation on data collected from a survey. Firstly, PV is quite effective to assist students for conducting several programming sub-tasks. Secondly, PV, at some extent, may help students to learn advanced topics on Introductory Programming course. Finally, despite the fact that several features should be incorporated to enhance understanding of students, PV is beneficial for learning Introductory Programming course, especially when it is frequently used.
Feature Image Watermarking Based on Bicubic Interpolation of Wavelet Coefficients Using CRT Prajanto Wahyu Adi; Yani Parti Astuti; Egia Rosi Subhiyakto
CommIT (Communication and Information Technology) Journal Vol. 11 No. 2 (2017): CommIT Journal
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/commit.v11i2.3870

Abstract

The main objective of watermarking method is to improve the robustness and imperceptibility. This paper introduces an improved CRT watermarking method using absolute value of interpolated wavelet coefficients aiming to improve the imperceptibility and robustness. The standard CRT method embeds the watermark bits on the blocks of pixels evenly. Hence, it can significantly reduce the quality of watermarked images when the watermark lies on the homogeneous area. Otherwise, the proposed method is embedding the watermark bits on the heterogeneous area by sorting the absolute magnitude of wavelet coefficients descending. The waveletcoefficients are selected from high frequency wavelet sub band HH. This scheme is able to determine the appropriate embedding location in certain range of value. The watermark bits are then embedding on the selectedpixel value using CRT scheme. The result shows that the average imperceptibility value the CRT is 0.9980 while the proposed method has average value of 0.9993. On robustness against compression, the proposed method achieves better result compared to the CRT with the average NC values of 0.7916 higher than the CRT value of 0.7530. These prove that the proposed method has better performance in term of imperceptibility and robustness against compression than the CRT method.
Network Security Analysis in Vanet Against Black Hole and Jellyfish Attack with Intrusion Detection System Algorithm Elsa Mustikawati; Doan Perdana; Ridha Muldina Negara
CommIT (Communication and Information Technology) Journal Vol. 11 No. 2 (2017): CommIT Journal
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/commit.v11i2.3886

Abstract

VANET is the key to the Intelligent Transportation Systems (ITS), where vehicles can communicate with others to exchange information in real time. VANET is an ad-hoc that has no fixed infrastructure and rapidly changing network topology. As the result, the network is insecure and vulnerable to various attacks both from within and outside the network. This research analyzes AODV routing protocol comparing the conditions without the attacks and with the attacks with the of black hole and jellyfish using the algorithm of Intrusion Detection System with the number of nodes changing from 10 to 100 nodes at the change speeds of 70, 80, 90, 100, 110, and 120 km/h. This research is simulated using Network Simulator 2 to model the network and ONESimulator to model node mobility. The analyzed QoS parameters are packet delivery ratio (PDR), throughput, and end-to-end delay. The results of the simulation show that changing the number of nodes and node velocity affects the performance in the network. On the number of nodes scenario with attacks, the average value of PDR decreases by 48.03%, throughput decreases by 50.23%, and delay, for black hole, decreases by 80.18% but increases by 47.87% for jellyfish. Whereas in the node velocity scenario, the average values of PDR, throughput, and delay decrease by 58.52%, 60.34%, 13.81% for blackhole attack, respectively. However, the delay increases by 123.91% for jellyfish attack.

Page 1 of 1 | Total Record : 6


Filter by Year

2017 2017


Filter By Issues
All Issue Vol. 17 No. 2 (2023): CommIT Journal Vol. 17 No. 1 (2023): CommIT Journal (In Press) Vol. 17 No. 1 (2023): CommIT Journal Vol. 16 No. 2 (2022): CommIT Journal Vol. 16 No. 1 (2022): CommIT Journal Vol. 15 No. 2 (2021): CommIT Journal Vol. 15 No. 1 (2021): CommIT Journal Vol 14, No 2 (2020): CommIT Vol. 14 No. 2 Tahun 2020 (IN PRESS) Vol 14, No 1 (2020): CommIT Vol. 14 No. 1 Tahun 2020 Vol. 14 No. 2 (2020): CommIT Journal Vol. 14 No. 1 (2020): CommIT Journal Vol 13, No 2 (2019): CommIT Vol. 13 No. 2 Tahun 2019 Vol 13, No 1 (2019): CommIT Vol. 13 No. 1 Tahun 2019 Vol. 13 No. 2 (2019): CommIT Journal Vol. 13 No. 1 (2019): CommIT Journal Vol 12, No 2 (2018): CommIT Vol. 12 No. 2 Tahun 2018 Vol 12, No 1 (2018): CommIT Vol. 12 No. 1 Tahun 2018 Vol. 12 No. 2 (2018): CommIT Journal Vol. 12 No. 1 (2018): CommIT Journal Vol 11, No 2 (2017): CommIT Vol. 11 No. 2 Tahun 2017 Vol 11, No 1 (2017): CommIT Vol. 11 No. 1 Tahun 2017 Vol. 11 No. 2 (2017): CommIT Journal Vol. 11 No. 1 (2017): CommIT Journal Vol 10, No 2 (2016): CommIT Vol. 10 No. 2 Tahun 2016 Vol 10, No 1 (2016): CommIT Vol. 10 No. 1 Tahun 2016 Vol. 10 No. 2 (2016): CommIT Journal Vol. 10 No. 1 (2016): CommIT Journal Vol 9, No 2 (2015): CommIT Vol. 9 No. 2 Tahun 2015 Vol 9, No 1 (2015): CommIT Vol. 9 No. 1 Tahun 2015 Vol. 9 No. 2 (2015): CommIT Journal Vol. 9 No. 1 (2015): CommIT Journal Vol 8, No 2 (2014): CommIT Vol. 8 No. 2 Tahun 2014 Vol 8, No 1 (2014): CommIT Vol. 8 No. 1 Tahun 2014 Vol. 8 No. 2 (2014): CommIT Journal Vol. 8 No. 1 (2014): CommIT Journal Vol 7, No 2 (2013): CommIT Vol.7 No. 2 Tahun 2013 Vol 7, No 1 (2013): CommIT Vol. 7 No. 1 Tahun 2013 Vol. 7 No. 2 (2013): CommIT Journal Vol. 7 No. 1 (2013): CommIT Journal Vol 6, No 2 (2012): CommIT Vol. 6 No. 2 Tahun 2012 Vol 6, No 1 (2012): CommIT Vol. 6 No. 1 Tahun 2012 Vol. 6 No. 2 (2012): CommIT Journal Vol. 6 No. 1 (2012): CommIT Journal Vol 5, No 2 (2011): CommIT Vol. 5 No. 2 Tahun 2011 Vol 5, No 1 (2011): CommIT Vol. 5 No. 1 Tahun 2011 Vol. 5 No. 2 (2011): CommIT Journal Vol. 5 No. 1 (2011): CommIT Journal Vol 4, No 2 (2010): CommIT Vol. 4 No. 2 Tahun 2010 Vol 4, No 1 (2010): CommIT Vol. 4 No. 1 Tahun 2010 Vol. 4 No. 2 (2010): CommIT Journal Vol. 4 No. 1 (2010): CommIT Journal Vol 3, No 2 (2009): CommIT Vol. 3 No. 2 Tahun 2009 Vol 3, No 1 (2009): CommIT Vol. 3 No. 1 Tahun 2009 Vol. 3 No. 2 (2009): CommIT Journal Vol. 3 No. 1 (2009): CommIT Journal Vol 2, No 2 (2008): CommIT Vol. 2 No. 2 Tahun 2008 Vol 2, No 1 (2008): CommIT Vol. 2 No. 1 Tahun 2008 Vol. 2 No. 2 (2008): CommIT Journal Vol. 2 No. 1 (2008): CommIT Journal Vol 1, No 2 (2007): CommIT Vol. 1 No. 2 Tahun 2007 Vol 1, No 1 (2007): CommIT Vol. 1 No. 1 Tahun 2007 Vol. 1 No. 2 (2007): CommIT Journal Vol. 1 No. 1 (2007): CommIT Journal More Issue