COMMUNICATION AND INFORMATION TECHNOLOGY JOURNAL (COMMIT)
The Performance of Boolean Retrieval and Vector Space Model in Textual Information Retrieval
boolean retrieval (br) and vector space model (vsm) are very popular methods in information retrieval for creating an inverted index and querying terms. br method searches the exact results of the tex...
Study of User Acceptance and Satisfaction of a Mandatory Government-Regulated Information System
this paper discusses the user acceptance of a mandatory government-regulated information system. the issue is investigated by using a modified utautframework. from random sample data of 65 respondents...
Socio-Technological Factors Influencing the Use of GSM in Communication and Sustainable Development in Nigeria
the study investigates the influence of social and technological problems/factors and the use of gsm in communication towards ensuring sustainable development in nigeria. the multi-stage sampling tech...
Interoperability and Reliability of Multiplatform MPLS VPN: Comparison of Traffic Engineering with RSVP-TE Protocol and LDP Protocol
one of the alternatives to overcome network scalability problem and maintaining reliability is using mpls vpn network. in reallity, the current network is already using a multiplatform of several diff...
Network Security Analysis in Vanet Against Black Hole and Jellyfish Attack with Intrusion Detection System Algorithm
vanet is the key to the intelligent transportation systems (its), where vehicles can communicate with others to exchange information in real time. vanet is an ad-hoc that has no fixed infrastructure a...
Feature Image Watermarking Based on Bicubic Interpolation of Wavelet Coefficients Using CRT
the main objective of watermarking method is to improve the robustness and imperceptibility. this paper introduces an improved crt watermarking method using absolute value of interpolated wavelet coef...
Implementation of Real-Time Static Hand Gesture Recognition Using Artificial Neural Network
this paper implements static hand gesture recognition in recognizing the alphabetical sign from “a” to “z”, number from “0” to “9”, and additional punctuation mark such as “period”, “
The Effectiveness of a Program Visualization Tool on Introductory Programming: a Case Study with PythonTutor
program visualization (pv) is an educational tool frequently used to assist users for understanding a program flow. however, despite its clear benefits, pv cannot be incorporated easily on introductor...
Web Based Application for Early Detection of Vitamin and Mineral Deficiency
deficiency of vitamin and mineral as part of micronutrient deficiency may lower human productivity. in general, lack of public understanding about micronutrient, limited number of nutritionist, time a...
Development of a Web-Based Information System for Material Inventory Control: the Case of an Automotive Company
inventory control is controlling the materials movement to fulfill the requirements. the materials can from the direct and indirect materials. the indirect materials are the materials that cannot be c...
Optimization of the Bugs Classification of the Ticketing System in Software Development: a Study Case
computer bug elimination is an important phase in the software development process. a ticketing system is usually used to classify the identified bug type and to assign a suitable developer. this syst...
Implementation of RSA 2048-bit and AES 256-bit with Digital Signature for Secure Electronic Health Record Application
this research addresses the implementation of encryption and digital signature technique for electronic health record to prevent cybercrime such as robbery, modification and unauthorised access. in th...
The Effects of E-Tourism to the Development of Tourism Sector in Indonesia
indonesia is a nation that ethnically and culturally unique and diverse. it has potentials to leverage the growth of its tourism sector. the sector has become important to boost not only regional and ...
Feature Extraction of Electroencephalography Signals Using Fast Fourier Transform
this article discusses a method within the area of brain-computer interface. the proposed method is to use the features extracted from the electroencephalograph signal and a three hidden-layer artific...
Executive Information System Modelling to Monitor Indonesian Criminal Rate
similar to any other governments, indonesia government has the role of protecting the security of its citizens via the established police unit. however, the executive unit is often unable to provide r...
Power System Stabilizer Design Based on a Particle Swarm Optimization Multiobjective Function Implemented Under Graphical Interface
power system stability considered a necessary condition for normal functioning of an electrical network. the role of regulation and control systems is to ensure that stability by determining the essen...
Development of Model for Providing Feasible Scholarship
the current work focuses on the development of a model to determine a feasible scholarship recipient on the basis of the naiv¨e bayes' method using very simple and limited attributes. those attributes...
Improving Scalability of Java Archive Search Engine Through Recursion Conversion and Multithreading
based on the fact that bytecode always exists on java archive, a bytecode based java archive search engine had been developed [1, 2]. although this system is quite effective, it still lack of scalabil...
The Effect of Social Media to the Brand Awareness of a Product of a Company
social media is an online media, where the users can easily participate, share, and create any content such as banner, posters, videos and advertisement. many companies use these social media a...
Use of Data Mining for Prediction of Customer Loyalty
this article discusses the analysis of customer loyalty using three data mining methods: c4.5,naive bayes, and nearest neighbor algorithms and real-world empirical data. the data con...
1 3 4 5 6 7 8 9 10