Submission Preparation Checklist

As part of the submission process, authors are required to check off their submission's compliance with all of the following items, and submissions may be returned to authors that do not adhere to these guidelines.

  • The submission has not been previously published, nor is it before another journal for consideration (or an explanation has been provided in Comments to the Editor).
  • The submission file is in OpenOffice, Microsoft Word, RTF, or WordPerfect document file format.
  • Where available, URLs for the references have been provided.
  • The text is single-spaced; uses a 12-point font; employs italics, rather than underlining (except with URL addresses); and all illustrations, figures, and tables are placed within the text at the appropriate points, rather than at the end.
  • The text adheres to the stylistic and bibliographic requirements outlined in the Author Guidelines, which is found in About the Journal.
  • If submitting to a peer-reviewed section of the journal, the instructions in Ensuring a Blind Review have been followed.

Author Guidelines


  • Naskah ditulis dalam Bahasa Indonesia atau Bahasa Inggris dan diketik dalam 2 kolom (ukuran kertas A4) dengan huruf Book Antiqua 10, rata kanan-kiri 2.5 cm.

  • Naskah diawali dengan judul, nama penulis (tanpa gelar), instansi dan alamat email untuk korespondensi. Isi naskah setidak-tidaknya berisi/menerangkan tentang pendahuluan, metoda, hasil diskusi, kesimpulan, daftar pustaka. Ucapan terima kasih bila diperlukan dapat dituliskan setelah bagian kesimpulan.

  • Naskah dilengkapi dengan abstrak (100-150 kata) yang ditulis dalam bahasa Indonesia dan Bahasa Inggris, masing-masing diikuti dengan kata kunci (3-5 kata). Abstrak hendaknya menjelaskan tentang apa yang diteliti/dikembangkan/dipikirkan, metoda dan hasil sehingga isi naskah dapat tergambar tanpa membaca seluruh tulisan.

  • Judul bagian naskah serta sub judul untuk bagian berbeda (pendahuluan, metoda, hasil, diskusi, kesimpulan) diberikan nomor arab secara bertingkat (1, 1.1., dst)

  • Satuan ukuran yang digunakan serta singkatannya mengikuti aturan International System of Units (SI).

  • Persamaan dinomori berurutan dengan nomor arab dalam kurung di sebelah kanan persamaan (rata kanan). Penggunaan simbol dalam persamaan diberi keterangan dalam bagian naskah di bawahnya.

  • Penyisipan gambar dan tabel disertai dengan j udul singkat di bawahnya (untuk gambar) dan di atasnya (untuk tabel) serta diberi nomor berurutan. Seluruh gambar dan tabel yang digunakan harus diulas pada bagian tulisan.

  • Dari daftar referensi yang dikutip dituliskan pada bagian akhir naskah dengan memberikan nomor urut sesuai dengan urut-urutan pengutipan pada naskah. Bagian naskah yang mengacu pada satu atau beberapa literatur lain hendaknya mencantumkan nomor urut referensi pada daftar pustaka.

  • Contoh penulisan referensi adalah sebagaimana berikut:


Daftar Pustaka


[1] K. Chen, Linear Networks and Systems. Belmont, CA: Wadsworth, 1993, pp. 123-135.


[2] The Oxford Dictionary of Computing, 5th ed. Oxford: Oxford University Press, 2003.


[3] Bass, P. Clements, and R. Kazman, Software Architecture in Practice, 2nd ed. Reading, MA: Addison Wesley, 2003. [E-book] Available: Safari e-book.


[4] D. Lipson and B. D. Horwitz, “Photosensory reception and transduction,” in Sensory Receptors and Signal Transduction, J. L. Spudich and B. H. Satir, Eds. New York: Wiley-Liss, 2001, pp-1-64.


[5] B. R. Strimpel, "Computer graphics," in McGraw-Hill Encyclopedia of Science and Technology, 8th ed., Vol. 4. New York: McGraw-Hill, 1997, pp. 279-283.


[6] Altun, “Understanding hypertext in the context of reading on the web: Language learners’ experience,” Current Issues in Education, vol. 6, no. 12, July, 2005. [Online]. Available: http://cie.ed.asu.edu/volume6/number12/.[Access-ed Dec. 2, 2007].


[7] Ayasso and A. Mohammad-Djafari, "Joint NDT Image Restoration and Segmentation Using Gauss–Markov–Potts Prior Models and Variational Bayesian Computation," IEEE Transactions on Image Processing, vol. 19, no. 9, pp. 2265-77, 2010. [Online]. Available: IEEE Xplore, http://www.ieee.org. [Accessed Sept. 10, 2010].


[8] Chen, W. Huang, B. Zhou, C. Liu, W.H. Mow, "PiCode: a new picture-embedding 2D barcode", IEEE Transactions on Image Processing, vol. 25, no. 8, pp. 3444-3458, August 2016.


[9] Bánoci, M. Broda, G. Bugár, D. Levický, "Universal Image Steganalytic Method", In: Radioengineering, vol. 23, no. 4, pp. 1213-1220, December 2014, ISSN 1210-2512.


[10] Smith, R. Jones, and K. Trello, “Adaptive filtering in data communications with self improved error reference,” In Proc. IEEE International Conference on Wireless Communications ’04, 2004, pp. 65-68.


[11] Liu and H. Miao, "A specification based approach to testing polymorphic attributes," in Formal Methods and Software Engineering: Proc.of the 6th Int. Conf. on Formal Engineering Methods, ICFEM 2004, Seattle, WA, USA, November 8-12, 2004, J. Davies, W. Schulte, M. Barnett, Eds. Berlin: Springer, 2004. pp. 306-19.


[12] Lach, "SBFS: Steganography based file system," in Proc. of the 2008 1st Int. Conf. on Information Technology, IT 2008, 19-21 May 2008, Gdansk, Poland [Online]. Available: IEEE Xplore, http://www.ieee.org. [Accessed: 10 Sept. 2010].


[13] A. Nimr, "Defuzzification of the outputs of fuzzy controllers," presented at 5th Int. Conf. on Fuzzy Systems, 1996, Cairo, Egypt. 1996.


[14] Kimura and A. Lipeles, “Fuzzy controller component,” U. S. Patent 14, 860,040, 14 Dec., 2006.


[15] Texas Instruments, “High speed CMOS logic analog multiplexers/demultiplexers,” 74HC4051 datasheet, Nov. 1997 [Revised Sept. 2002].


[16] European Telecommunications Standards Institute, “Digital Video Broadcasting (DVB): Implementati-on guidelines for DVB terrestrial services; transmission aspects,” European Telecommuni-cations Standards Institute, ETSI TR-101-190, 1997. [Online]. Available: http://www.etsi.org. [Accessed: Aug. 17, 1998].


[17] Sussman, "Home page - Dr. Gerald Sussman," July 2002. [Online]. Available: http:// www.comm.pdx.edu/faculty/Sussman/sussmanpage.htm. [Accessed: Sept. 12, 2004].


[18] Karnik, “Performance of TCP congestion control with rate feedback: TCP/ABR and rate adaptive TCP/IP,” M. Eng. thesis, Indian Institute of Science, Bangalore, India, Jan. 1999.


[19] Sudweeks, Development and Leadership in Computer-Mediated Collaborative Groups. PhD [Dissertation]. Murdoch, WA: Murdoch Univ., 2007. [Online]. Available: Australasian Digital Theses Program.


[20] Padhye, V. Firoiu, and D. Towsley, “A stochastic model of TCP Reno congestion avoidance and control,” Univ. of Massachusetts, Amherst, MA, CMPSCI Tech. Rep. 99-02, 1999.


[21] Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specification, IEEE Std. 802.11, 1997.