- Focus and Scope
- Section Policies
- Peer Review Process
- Publication Frequency
- Open Access Policy
- Archiving
- Pulication Ethics
- Screening Plagiarism
- Digital Archiving
- Statictic Download Article
Focus and Scope
The Jurnal Teknik Informatika C.I.T Medicom is a scientific journal that contains scientific writings on the results of pure research and applied research in the field of Informatics Engineering as well as general reviews of the development of related theories, methods, and applied sciences. can be seen more clearly below:
-
Artificial Intelligence (AI)
- Machine Learning and Deep Learning
- Natural Language Processing (NLP)
- Computer Vision and Pattern Recognition
- Expert Systems and Decision Support Systems
-
Big Data and Data Science
- Data Analysis and Visualization
- Large-Scale Data Processing
- Data Mining and Knowledge Discovery
- Cloud and Edge Computing Technologies
-
Cybersecurity
- Cryptography and Information Security
- Threat Detection and Prevention Systems
- IoT Security and Digital Infrastructure
- Digital Forensics and Data Privacy
-
Internet of Things (IoT)
- IoT Integration in Industry and Healthcare
- IoT Communication Protocols
- AI-Based IoT Systems Development
- Sustainability and Energy Efficiency in IoT
-
Software Engineering
- Agile Development and DevOps
- Software Testing and Validation
- Formal Methods in System Development
- Component-Based System Integration
-
Network and Communication Technologies
- 5G and 6G Network Architectures
- Wireless and Satellite Communication Systems
- Network Optimization and Communication Protocols
- Sensor Technology and Smart Grids
-
Multimedia Processing
- Video Compression and Streaming
- Speech and Audio Recognition
- Virtual Reality (VR) and Augmented Reality (AR)
- Game Applications and Multimodal Interactions
-
Cloud and Distributed Computing
- Cloud Virtualization and Infrastructure
- Grid and Fog Computing Systems
- Reliability and Scalability of Distributed Systems
- Blockchain and Distributed Ledger Technology
-
Information Systems and Technology Management
- Digital Transformation in Public and Private Sectors
- Enterprise Resource Planning (ERP) Systems
- Information System Integration and Management
- Technology Strategy and Innovation
-
Educational Technology
- AI-Based Adaptive Learning Systems
- Development of e-Learning and m-Learning Platforms
- Gamification in Education
- Virtual Labs and Simulation in Learning
-
Theoretical Computing and Algorithms
- Algorithm Design and Analysis
- Parallel Programming and Quantum Computing
- Combinatorial Optimization and Heuristics
- Complexity Theory and Automata
-
Technological Applications in Real Life
- Smart City and Transportation Systems
- Digital Health Applications (e-Health and m-Health)
- Smart Agriculture Applications
- Renewable Energy and Environmental Management
-
Foundations of Computing
- Computational Complexity Theory: Classifications (P, NP, PSPACE, etc.), reductions, and completeness.
- Automata Theory: Finite automata, pushdown automata, Turing machines, and their applications.
- Formal Languages: Context-free grammars, regular languages, and parsing techniques.
- Lambda Calculus and Formal Methods: Applications in programming language design and verification.
-
Algorithm Design and Optimization
- Classic Algorithm Design Paradigms: Divide and conquer, greedy algorithms, dynamic programming, and backtracking.
- Approximation Algorithms: Techniques for tackling NP-hard problems with provable performance bounds.
- Parallel and Distributed Algorithms: Strategies for shared and distributed memory models.
- Online Algorithms and Competitive Analysis: Real-time decision-making algorithms.
-
Graph Theory and Network Algorithms
- Graph Algorithms: Shortest path, maximum flow, and graph coloring techniques.
- Network Optimization: Spanning trees, clustering, and routing protocols.
- Spectral Graph Theory: Eigenvalues of graphs and their applications in machine learning and network analysis.
- Social Network Analysis: Algorithms for community detection and influence maximization.
-
Heuristics and Metaheuristics
- Evolutionary Algorithms: Genetic algorithms, particle swarm optimization, and ant colony optimization.
- Local Search and Simulated Annealing: Techniques for combinatorial optimization problems.
- Hybrid Metaheuristic Approaches: Combining multiple strategies for enhanced performance.
-
Computational Geometry
- Convex Hulls, Voronoi Diagrams, and Delaunay Triangulations.
- Geometric Algorithms for Robotics, CAD, and GIS.
- Intersection, Clustering, and Shape Matching Problems.
-
Randomized and Probabilistic Algorithms
- Monte Carlo and Las Vegas Algorithms: Trade-offs in accuracy and runtime.
- Probabilistic Analysis of Algorithms: Average-case performance evaluation.
- Markov Chains and Random Walks: Applications in optimization and machine learning.
-
Quantum Computing and Algorithms
- Quantum Complexity Classes: BQP, QMA, and more.
- Quantum Algorithm Development: Shor's algorithm, Grover's search, and quantum simulation techniques.
- Quantum Error Correction and Cryptography.
-
Bioinformatics and Computational Biology Algorithms
- Sequence Alignment and Phylogenetic Tree Construction.
- Protein Structure Prediction and Molecular Docking.
- Genome Assembly and Analysis.
-
Emerging Areas in Algorithm Development
- Algorithms for Big Data: Streaming algorithms, sublinear algorithms, and MapReduce paradigms.
- Algorithms for AI and Machine Learning: Neural architecture search and gradient-free optimization.
- Energy-Efficient and Green Algorithms: Computational techniques for sustainability.
-
Applications of Theoretical Computing in Interdisciplinary Domains
- Financial Computing: High-frequency trading algorithms, portfolio optimization, and risk analysis.
- Cryptography and Secure Computation: Homomorphic encryption and multi-party computation.
- Computational Social Science: Modeling human behavior and decision-making algorithms.
- Game Theory and Mechanism Design: Algorithms for competitive and cooperative scenarios.
This comprehensive scope allows for the exploration of both classical and cutting-edge developments in theoretical computing and algorithmic research, fostering innovation across scientific and industrial domains.
Section Policies
Articles
Open Submissions | Indexed | Peer Reviewed |
Peer Review Process
Jurnal Teknik Informatika C.I.T Medicom adopts Doble blind review process which is closely monitored by the editors. Editors undertake editorial review to assess the quality and type of submission before sending it to the review process. Manuscripts not meeting the scientific standards will not be considered for the reviewing process. Authors are expected to pay attention to the instructions for authors and also indicate the category in which they are publishing if it is not a Review article. Editors will also check the readability, grammatical usage and may ask for resubmission if papers fare poorly in these parameters.
Editors request referees to advice on the scientific merit as well as the likely appeal the paper will have for broad scientometrics readership. Editors will be in contact with the referees once paper is sent to them, with periodic reminders of their due date. Once all the reviews are in-house, the Editor handling the manuscript will most likely make a decision within a day or two. The editor will then contact the corresponding author with the decision. Reviewers invest precious time in the belief that they are making important contributions to the scientific process.
Authors can differ with the reviewer comments supported by rational explanation which will be examined by the Editor and can be sent to the said referee again. However, offensive remarks on reviewer’s comments will be subjected to the cancellation of publication
Editorial assessment is also done after the referee process is completed before finally recommending the paper for the journal or otherwise.
All efforts are done to complete the whole process within three months from submission with the first decision on an average done within 45 days to inform the status of their article.
The entire review process of the articles submitted to Jurnal Teknik Informatika C.I.T Medicom are done online and digitally. Authors must use the online submission system for submitting their manuscript. Only if they are unable to do so they should contact the editor through email.
Submission & Peer Review Process (Key Steps)
- Author submits all required materials, including copyright form, and separate cover letter.
- The submitted article is first checked by the editor(s) in terms of whether it is within the broad scope of the journal and has sufficient merit. Editor(s) also pay attention to the readability, grammar and usage before considering for formally initiating the review process. The author will be informed quickly if their paper is rejected at this stage. Also there will be technical rejection if authors give their names and affiliations in the main manuscript, the tables and figures as indicated in the text is missing or have not followed instructions to authors.
- After initial approval by the editor, Completed submission is sent out to two or three reviewers.
- Reviewers review the article and send it back to the editorial office for processing.
- After initial review, Editor-in-Chief releases reviews to authors.
- Authors are asked to respond to reviewers and make necessary corrections.
- Article is sent out for re-review.
- Editor-in-Chief may accept, reject, accept with minor alterations, or sent out for third review.
- If accepted, author must submit final version. Version will be added to "in-press" queue with publisher.
- Prior to publication, publisher will sent galleys to authors. No edits may be made after galleys are approved.
Publication Frequency
Jurnal Teknik Informatika C.I.T Medicom is published Bimonthly (January, March, May, July, September, and November) a year.
Open Access Policy
This journal provides immediate open access to its content on the principle that making research freely available to the public supports a greater global exchange of knowledge.
Archiving
This journal utilizes the LOCKSS system dan CLOCKSS to create a distributed archiving system among participating libraries and permits those libraries to create permanent archives of the journal for purposes of preservation and restoration.. More...
Pulication Ethics
Jurnal Teknik Informatika C.I.T Medicom is referring to Committee on Publication Ethics (COPE). Details of guideline and international standards could be found on COPE website.
Duties of Authors
- Reporting Standars:
Authors of reports of original research should present an accurate account of the work performed as well as an objective discussion of its significance. Underlying data should be represented accurately in the paper. A paper should contain sufficient detail and references to permit others to replicate the work. Fraudulent or knowingly inaccurate statements constitute unethical behaviour and are unacceptable. - Data Access and Retention:
Authors are asked to provide the raw data in connection with a paper for editorial review, and should be prepared to provide public access to such data (consistent with the ALPSP-STM Statement on Data and Databases), if practicable, and should in any event be prepared to retain such data for a reasonable time after publication. - Originality and Plagiaris: The authors should ensure that they have written entirely original works, and if the authors have used the work and/or words of others that this has been appropriately cited or quoted.
- Multiple, Redundant or Concurrent Publication:
An author should not in general publish manuscripts describing essentially the same research in more than one journal or primary publication. Submitting the same manuscript to more than one journal concurrently constitutes unethical publishing behaviour and is unacceptable. - Acknowledgement of Sources:
Proper acknowledgment of the work of others must always be given. Authors should cite publications that have been influential in determining the nature of the reported work. - Authorship of the Paper:
Authorship should be limited to those who have made a significant contribution to the conception, design, execution, or interpretation of the reported study. All those who have made significant contributions should be listed as co-authors. Where there are others who have participated in certain substantive aspects of the research project, they should be acknowledged or listed as contributors. The corresponding author should ensure that all appropriate co-authors and no inappropriate co-authors are included on the paper, and that all co-authors have seen and approved the final version of the paper and have agreed to its submission for publication. - Disclosure and Conflicts of Interest:
All authors should disclose in their manuscript any financial or other substantive conflict of interest that might be construed to influence the results or interpretation of their manuscript. All sources of financial support for the project should be disclosed. - Fundamental errors in published works:
When an author discovers a significant error or inaccuracy in his/her own published work, it is the authors obligation to promptly notify the journal editor or publisher and cooperate with the editor to retract or correct the paper. - Hazards and Human or Animal Subjects:
If the work involves chemicals, procedures or equipment that have any unusual hazards inherent in their use, the author must clearly identify these in the manuscript.
Duties of Editors
- Fair Play:
An editor at any time evaluate manuscripts for their intellectual content without regard to race, gender, sexual orientation, religious belief, ethnic origin, citizenship, or political philosophy of the authors. - Confidentiality:
The editor and any editorial staff must not disclose any information about a submitted manuscript to anyone other than the corresponding author, reviewers, potential reviewers, other editorial advisers, and the publisher, as appropriate. - Disclosure and Conflicts of Interest:
Unpublished materials disclosed in a submitted manuscript must not be used in an editor's own research without the express written consent of the author. - Publication Decisions:
The editor board journal are responsible for deciding which of the articles submitted to the journal should be published. The validation of the work in question and its importance to researchers and readers must always drive such decisions. The editors may be guided by the policies of the journal's editorial board and constrained by such legal requirements as shall then be in force regarding libel, copyright infringement and plagiarism. The editors may confer with other editors or reviewers in making this decision. - Review of Manuscripts:
Editor must ensure that each manuscript is initially evaluated by the editor for originality. The editor should organize and use peer review fairly and wisely. Editors should explain their peer review processes in the information for authors and also indicate which parts of the journal are peer reviewed. Editor should use appropriate peer reviewers for papers that are considered for publication by selecting people with sufficient expertise and avoiding those with conflicts of interest.
Duties of Reviewers
- Contribution to Editorial Decisions:
Peer review assists the editor in making editorial decisions and through the editorial communications with the author may also assist the author in improving the paper. - Promptness:
Any selected referee who feels unqualified to review the research reported in a manuscript or knows that its prompt review will be impossible should notify the editor and excuse himself from the review process - Standards of Objectivity:
Reviews should be conducted objectively. Personal criticism of the author is inappropriate. Referees should express their views clearly with supporting arguments. - Confidentiality:
Any manuscripts received for review must be treated as confidential documents. They must not be shown to or discussed with others except as authorized by the editor. - Disclosure and Conflict of Interest:
Privileged information or ideas obtained through peer review must be kept confidential and not used for personal advantage. Reviewers should not consider manuscripts in which they have conflicts of interest resulting from competitive, collaborative, or other relationships or connections with any of the authors, companies, or institutions connected to the papers. - Acknowledgement of Sources:
Reviewers should identify relevant published work that has not been cited by the authors. Any statement that an observation, derivation, or argument had been previously reported should be accompanied by the relevant citation. A reviewer should also call to the editor's attention any substantial similarity or overlap between the manuscript under consideration and any other published paper of which they have personal knowledge.
Screening Plagiarism
Papers submitted to Jurnal Teknik Informatika C.I.T Medicom will be screened for plagiarism using Tunitin plagiarism detection tools. Jurnal Teknik Informatika C.I.T Medicom will immediately reject papers leading to plagiarism or self-plagiarism.
One of the members of the editing team will use a similarity/plagiarism tool to look for similarities between two papers before sending them on to the reviewers. It is required that the level of similarity between any two papers that are submitted to the Jurnal Teknik Informatika C.I.T Medicom be less than 20%.
Plagiarism occurs when someone presents the ideas or words of another as their own without their permission, credit, or acknowledgement, or when they fail to properly cite the sources that they used. Plagiarism can be committed in a variety of ways, including the direct copying of the work of another person or the paraphrase of that work. In order to make an accurate determination as to whether or not an author has plagiarized their work, the following scenarios are highlighted here:
- It is possible for one author to actually replicate the work of another author by duplicating it word for word, in its entirety or in part, without the consent of the original author or acknowledging or attributing the original source. Comparing the original source to the manuscript or other work that is suspected of containing plagiarized material is one way to spot instances of this unethical conduct.
- When one author reproduces a significant portion of the work of another author without permission, acknowledgement, or citation, this practice is known as substantial copying. In the area of intellectual property law, the term "substantial," which can be understood both in terms of quality and quantity, is frequently employed. The term "quality" refers to the proportional significance of the copied text in relation to the overall value of the work.
- The process of extracting concepts, words, or phrases from one source and reassembling them into new sentences within another source is known as paraphrasing. When the author does not correctly cite the original work or does not acknowledge the creator of the original work, this practice is considered unethical. This type of plagiarism is the most difficult to detect because of the way it is written.
Digital Archiving
This journal utilizes the LOCKSS system dan CLOCKSS to create a distributed archiving system among participating libraries and permits those libraries to create permanent archives of the journal for purposes of preservation and restoration.. More...