Editorial Policies

Focus and Scope

All areas of engineering and science like Computer Science, Chemistry, Physics, Biology, Medical Science, Geology, Statistics, Accounting, Social Science, Mathematics, Management and Economics are covered (the areas are not limited to the following):

Active and Programmable Networks
Active safety systems
Ad Hoc & Sensor Network
Ad hoc networks for pervasive communications
Adaptive, autonomic and context-aware computing
Advance Computing technology and their application
Advanced Computing Architectures and New Programming Models
Advanced control and measurement
Agent-based middleware
Alert applications
application specific IC's
automotive, marine and aero-space control and all other control applications
Autonomic and self-managing middleware
Autonomous vehicle
B2B and B2C management
BioInformatics
Bio-Medicine
Biotechnology
Broadband and intelligent networks
Broadband wireless technologies
CAD/CAM/CAT/CIM
Call admission and flow/congestion control
Capacity planning and dimensioning
Changing Access to Patient Information
Channel capacity modelling and analysis
Cloud Computing and Applications
Collaborative applications
Communication application
Communication architectures for pervasive computing
Communication systems
Computational intelligence
computer and microprocessor-based control
Computer Architecture and Embedded Systems
Computer Business
Computer Vision
Computer-based information systems in health care
Computing Ethics
Computing Practices & Applications
Congestion and/or Flow Control
Content Distribution
Context-awareness and middleware
Creativity in Internet management and retailing
Cross-layer design and Physical layer based issue
Cryptography
Data Base Management
Data fusion
Data Mining
Data retrieval
Data Storage Management
Decision analysis methods
Decision making
Digital Economy and Digital Divide
Digital signal processing theory
Distributed Sensor Networks
Drives automation
DSP implementation
Economics Theory
E-Business
E-Commerce
E-Government
Electronic transceiver device for Retail Marketing Industries
Embeded Computer System
Emerging advances in business and its applications
Emerging signal processing areas
Enabling technologies for pervasive systems (e.g., wireless BAN, PAN)
Encryption
Energy-efficient and green pervasive computing
Estimation and identification techniques
Evaluation techniques for middleware solutions
Event-based, publish/subscribe, and message-oriented middleware
Evolutionary computing and intelligent systems
Expert approaches
Facilities planning and management
Flexible manufacturing systems
Formal methods and tools for designing
Fuzzy algorithms
Fuzzy logics
GPS and location-based applications
Green Computing
Grid Networking
Healthcare Management Information Technology
High-speed Network Architectures
Human Computer Interaction (HCI)
Human-machine interfaces
Hybrid Sensor
ICT Convergence
Image analysis and processing
Image and multidimensional signal processing
Image and Multimedia applications
Industrial applications of neural networks
Industrial automated process
Industrial communications
Information and data security
Information indexing and retrieval
Information Management
Information processing
Information System
Information systems and applications
Information Technology and their application
Infrastructure monitoring and control applications
Innovation and product development
Innovation Technology and Management
Innovative pervasive computing applications
Instrumentation electronics
Intelligent Control System
Intelligent sensors and actuators
Internet applications and performances
Internet Services and Applications
Internet Technologies, Infrastructure, Services and Applications
Interworking architecture and interoperability
Knowledge based systems
Knowledge management
Location and provisioning and mobility management
Location Based Services
Logistics applications
Management Theory
Management information systems
Medical imaging
MEMS and system integration
Micro/nano technology
Microsensors and microactuators
Middleware Issues
Middleware services and agent technologies
Middleware solutions for reliability, fault tolerance, and quality-of-service
Mobile and Wireless Networks
Mobile applications
Mobile networks and services
Mobile/Wireless computing systems and services in pervasive computing
Multimedia Communications
Multimodal sensing and context for pervasive applications
Multisensor fusion
Navigation and Guidance
Navigation Systems
Network Control and Management
Network management and services
Network Measurement
Network Modeling and Simulation
Network Performance
Network Protocols
Network Sensor
Network-based automation
Networked vehicles applications
Networking theory and technologies
Neural Networks
Neuro-Fuzzy
Neuro-Fuzzy application
Nonlinear and adaptive control
Nursing information management
On-board diagnostics
Open Models and Architectures
Open Source Tools
Operations research
Optical Networks
Optimal and robot control
Pattern Recognition
Peer to Peer and Overlay Networks
Perception and semantic interpretation
Pervasive Computing
Performance optimization
Pervasive opportunistic communications and applications
Pervasive sensing
Positioning and tracking technologies
Power plant automation
Programming paradigms for pervasive systems
Quality of Service and Quality of Experience
Quality of service and scheduling methods
Real-time computer control
Real-time information systems
Real-time multimedia signal processing
Reconfigurable, adaptable, and reflective middleware approaches
Relay assisted and cooperative communications
Remote health monitoring
Remote Sensing
Resource allocation and interference management
RFID and sensor network applications
Scalability of middleware
Security and risk management
Security middleware
Security, Privacy and Trust
Security Systems and Technolgies
Sensor array and multi-channel processing
Sensor fusion
Sensors and RFID in pervasive systems
Service oriented middleware
Signal Control System
Signal processing
Signal processing in education
Smart devices and intelligent environments
Smart home applications
Social and economic models for pervasive systems
Social Networks and Online Communities
Software Engineering
Software engineering techniques for middleware
Software evolution and maintenance in pervasive systems
Speech interface
Speech processing
Standards and interfaces for pervasive computing environments
Supply Chain Management
System security and security technologies
Technology in Education
Theoretical Computer Science
Transportation information
Trust, security and privacy issues in pervasive systems
Ubiquitous and pervasive applications
Ubiquitous Networks
User interfaces and interaction models
Vehicle application of affective computing
Verifying and evaluating middleware
Virtual immersive communications
Virtual reality
Vision-based applications
Visualization and Virtual Reality as Applied to Computational Science
Wired/Wireless Sensor
Wireless technology

 

 

Section Policies

Articles

Checked Open Submissions Checked Indexed Checked Peer Reviewed
 

Peer Review Process

Articles submitted to Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) will be evaluated for publication through 2 stages of review, ie pre-review and substance review.

In the first stage, the editorial team of JTIK journal evaluates the conformity of the article with the focus and scope of the journal as well as the journal style and specific JTIK author guidelines. All out-scope article will be declined. JTIK uses Google Scholar and Turnitin software for plagiarism and similarity checking of the submitted article. Duration of evaluation between 1-3 weeks.

Substantial single-blind reviews are performed by at least two reviewers — duration of evaluation between 3-12 weeks after review assignments. If desired, the reviewer may request a re-review after the author revises his/her article.

The Editor in Chief authorizes the decision of whether the article can be published by considering recommendations from reviewers. JTIK publishes In-Press issue containing accepted articles for faster indexing. JTIK also publishes the camera-ready articles in the In-Progress issue prior to regular issue publication.

If you would like to become a reviewer for JTIK journal, please complete the online Application Form. You should provide some descriptive words of your reviewing interests. We will register you as a Reviewer and an Author into JTIK journal within three working days. Your account information, ie username and password, will be delivered to your email.

 

Open Access Policy

This journal provides immediate open access to its content on the principle that making research freely available to the public supports a greater global exchange of knowledge.

 

Publication Frequency

JTIKis scheduled for publication in January-Juny, and July-December (2 issue a year). It is electronically published via journal website (http://journal.lembagakita.org/index.php/jtik). Each published articles will be assigned with a DOI (digital object identifier).

 

Article Processing Charge

Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) is a free and open-access journal. Author submission, as well as article processing and publishing, are charged 500 K IDR or $40 USD. Readers can read and download any full-text article for free.

 

Publication Ethics and Malpractice Statement

Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) is a peer-reviewed electronic journal. This statement clarifies the ethical behavior of all parties involved in the act of publishing an article in this journal, including the author, the chief editor, the Editorial Board, the peer-reviewer­­­­­ and the publisher (KITA Institute). This statement is based on COPE’s Best Practice Guidelines for Journal Editors.

Ethical Guideline for Journal Publication

The publication of an article in a peer-reviewed JTIK journal is an essential building block in the development of a coherent and respected network of knowledge. It is a direct reflection of the quality of the work of the authors and the institutions that support them. Peer-reviewed articles support and embody the scientific method. It is therefore important to agree upon standards of expected ethical behavior for all parties involved in the act of publishing: the author, the journal editor, the peer reviewer, the publisher, and the society. 

Research Division KITA Institute as the publisher of JTIK journal takes its duties of guardianship over all stages of publishing extremely seriously and we recognize our ethical and other responsibilities. We are committed to ensuring that advertising, reprint or other commercial revenue has no impact or influence on editorial decisions. In addition, the Research Division KITA Institute and Editorial Board will assist in communications with other journals and/or publishers where this is useful and necessary.

Publication decisions

The editor of the JTIK journal is responsible for deciding which of the articles submitted to the journal should be published. The validation of the work in question and its importance to researchers and readers must always drive such decisions. The editors may be guided by the policies of the journal's editorial board and constrained by such legal requirements as shall then be in force regarding libel, copyright infringement and plagiarism. The editors may confer with other editors or reviewers in making this decision.

Fair play

An editor at any time evaluates manuscripts for their intellectual content without regard to race, gender, sexual orientation, religious belief, ethnic origin, citizenship, or political philosophy of the authors.

Confidentiality

The editor and any editorial staff must not disclose any information about a submitted manuscript to anyone other than the corresponding author, reviewers, potential reviewers, other editorial advisers, and the publisher, as appropriate.

Disclosure and conflicts of interest

Unpublished materials disclosed in a submitted manuscript must not be used in an editor's own research without the express written consent of the author.

Duties of Reviewers

Contribution to Editorial Decisions 

Peer review assists the editor in making editorial decisions and through the editorial communications with the author may also assist the author in improving the paper.

Promptness 

Any selected referee who feels unqualified to review the research reported in a manuscript or knows that its prompt review will be impossible should notify the editor and excuse himself from the review process.

Confidentiality 

Any manuscripts received for review must be treated as confidential documents. They must not be shown to or discussed with others except as authorized by the editor.

Standards of Objectivity 

Reviews should be conducted objectively. Personal criticism of the author is inappropriate. Referees should express their views clearly with supporting arguments.

Acknowledgement of Sources 

Reviewers should identify relevant published work that has not been cited by the authors. Any statement that an observation, derivation, or argument had been previously reported should be accompanied by the relevant citation. A reviewer should also call to the editor's attention any substantial similarity or overlap between the manuscript under consideration and any other published paper of which they have personal knowledge.

Disclosure and Conflict of Interest 

Privileged information or ideas obtained through peer review must be kept confidential and not used for personal advantage. Reviewers should not consider manuscripts in which they have conflicts of interest resulting from competitive, collaborative, or other relationships or connections with any of the authors, companies, or institutions connected to the papers.

Duties of Authors

Reporting standards 

Author's reports of original research should present an accurate account of the work performed as well as an objective discussion of its significance. Underlying data should be represented accurately in the paper. A paper should contain sufficient detail and references to permit others to replicate the work. Fraudulent or knowingly inaccurate statements constitute unethical behavior and are unacceptable.

Data Access and Retention 

Authors are asked to provide the raw data in connection with a paper for editorial review, and should be prepared to provide public access to such data (consistent with the ALPSP-STM Statement on Data and Databases), if practicable, and should in any event be prepared to retain such data for a reasonable time after publication.

Originality and Plagiarism 

The authors should ensure that they have written entirely original works, and if the authors have used the work and/or words of others that this has been appropriately cited or quoted.

Multiple, Redundant or Concurrent Publication 

An author should not, in general, publish manuscripts describing essentially the same research in more than one journal or primary publication. Submitting the same manuscript to more than one journal concurrently constitutes unethical publishing behavior and is unacceptable.

Acknowledgement of Sources 

Proper acknowledgment of the work of others must always be given. Authors should cite publications that have been influential in determining the nature of the reported work.

Authorship of the Paper 

Authorship should be limited to those who have made a significant contribution to the conception, design, execution, or interpretation of the reported study. All those who have made significant contributions should be listed as co-authors. Where there are others who have participated in certain substantive aspects of the research project, they should be acknowledged or listed as contributors. The corresponding author should ensure that all appropriate co-authors and no inappropriate co-authors are included on the paper and that all co-authors have seen and approved the final version of the paper and have agreed to its submission for publication.

Hazards and Human or Animal Subjects 

If the work involves chemicals, human, animals, procedures or equipment that have any unusual hazards inherent in their use, the author must clearly identify these in the manuscript.

Disclosure and Conflicts of Interest 

All authors should disclose in their manuscript any financial or another substantive conflict of interest that might be construed to influence the results or interpretation of their manuscript. All sources of financial support for the project should be disclosed.

Fundamental errors in published works

When an author discovers a significant error or inaccuracy in his/her own published work, it is the author’s obligation to promptly notify the journal editor or publisher and cooperate with the editor to retract or correct the paper.

 

Content License


Creative Commons License
 Creative Common Attribution-ShareAlike 4.0 International (CC BY-SA 4.0)

You are free to:

  • Share — copy and redistribute the material in any medium or format
  • Adapt — remix, transform, and build upon the material
  • for any purpose, even commercially.

The licensor cannot revoke these freedoms as long as you follow the license terms.

Under the following terms:

  • Attribution — You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
  • ShareAlike — If you remix, transform, or build upon the material, you must distribute your contributions under the same license as the original.
  • No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.

Notices:

  • You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation.
  • No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.