cover
Contact Name
Nurul Khairina
Contact Email
nurulkhairina27@gmail.com
Phone
+6282167350925
Journal Mail Official
nurul@itscience.org
Editorial Address
Jl. Setia Luhur Lk V No 18 A Medan Helvetia Tel / fax : +62 822-5158-3783 / +62 822-5158-3783
Location
Kota medan,
Sumatera utara
INDONESIA
Journal of Computer Networks, Architecture and High Performance Computing
ISSN : 26559102     EISSN : 26559102     DOI : 10.47709
Core Subject : Science, Education,
Journal of Computer Networks, Architecture and Performance Computing is a scientific journal that contains all the results of research by lecturers, researchers, especially in the fields of computer networks, computer architecture, computing. this journal is published by Information Technology and Science (ITScience) Research Institute, which is a joint research and lecturer organization and issued 2 (two) times a year in January and July. E-ISSN LIPI : 2655-9102 Aims and Scopes: Indonesia Cyber Defense Framework Next-Generation Networking Wireless Sensor Network Odor Source Localization, Swarm Robot Traffic Signal Control System Autonomous Telecommunication Networks Smart Cardio Device Smart Ultrasonography for Telehealth Monitoring System Swarm Quadcopter based on Semantic Ontology for Forest Surveillance Smart Home System based on Context Awareness Grid/High-Performance Computing to Support drug design processes involving Indonesian medical plants Cloud Computing for Distance Learning Internet of Thing (IoT) Cluster, Grid, peer-to-peer, GPU, multi/many-core, and cloud computing Quantum computing technologies and applications Large-scale workflow and virtualization technologies Blockchain Cybersecurity and cryptography Machine learning, deep learning, and artificial intelligence Autonomic computing; data management/distributed data systems Energy-efficient computing infrastructure Big data infrastructure, storage and computation management Advanced next-generation networking technologies Parallel and distributed computing, language, and algorithms Programming environments and tools, scheduling and load balancing Operation system support, I/O, memory issues Problem-solving, performance modeling/evaluation
Articles 50 Documents
Search results for , issue "Vol. 2 No. 1 (2020): Computer Networks, Architecture and High Performance Computing" : 50 Documents clear
Decision Support System Selection of Best Employee At PT. Intiberkah Sinar Sejahtera Using Simple Additive weighting Method Feri Sahputra; Fricles Ariwisanto Sianturi
Journal of Computer Networks, Architecture and High Performance Computing Vol. 2 No. 1 (2020): Computer Networks, Architecture and High Performance Computing
Publisher : Information Technology and Science (ITScience)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/cnapc.v2i1.350

Abstract

The problem of PT. Sinar Sejahtera Intiberkah are still many employees of PT. Intiberkah Sinar Sejahtera especially the logistics employees who are critical to the company that should be worthy to obtain as the best employees but until now there has been no employees at the logistics become the best employee in the company of PT. Sinar Sejahtera Intiberkah tersebut.Oleh Therefore, in this study used a decision support system that can be used to help the PT. Intiberkah Sinar Sejahtera in determining the eligible employees in the selection of the best employees, there are four criteria taken in these elections is the first no ethical criteria, these criteria related to attitudes and ways of speaking with courtesy to superiors.
Expert System for Diagnosing Diseases Tubercolosis Using Bayes Method In Puskesmas Petumbukan Muhammad Ridho Syahwana; R. Mahdalena Simanjorang
Journal of Computer Networks, Architecture and High Performance Computing Vol. 2 No. 1 (2020): Computer Networks, Architecture and High Performance Computing
Publisher : Information Technology and Science (ITScience)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/cnapc.v2i1.351

Abstract

Tuberculosis is an infection caused by acid-fast bacilli (AFB). Tuberculosis is an infectious disease apat affect anyone over the air. Tuberculosis is an infectious disease berbahaya.Tuberculosis a chronic or chronic disease that can strike between the age of 15-35 years. How to diagnose tuberculosis is by way of the expert of experts interviewed then test sputum samples using a lab to determine the positive or negative tuberculosis disease so it takes a long time. Therefore it takes an expert system with Bayesian methods to facilitate the penykit diagnosing tuberculosis. This expert system developed using Microsoft Visual Studio 2010 as well as by using Microsoft Access 2010 database.
Analysis and Comparison of Methods Evaluation Process Multifactor Simple Additive Weighting Method In Tilawatil Musabaqah Quran (MTQ) North Sumatra Province Heriyanto Heriyanto; Olven Manahan
Journal of Computer Networks, Architecture and High Performance Computing Vol. 2 No. 1 (2020): Computer Networks, Architecture and High Performance Computing
Publisher : Information Technology and Science (ITScience)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/cnapc.v2i1.352

Abstract

 The purpose of holding an MTQ is Essentially to broadcast the Koran while looking for the bestto represent the MTQ at the next level. But the point is the greatness of newspapers. With that symbol, itIS ALSO DEMANDED that a person is not only good at reading and writing, but far more important isunderstanding the content of the newspaper itself. The goal is not only for of participants (who take partin the competition) but Also (and this is more important) for the listener. Decision Support System (DSS)is used as an alternative to application in the selection of MusabaqahTilawatil Quran (MTQ) in NorthSumatraProvince by using the multifactor Evaluation Process Method and the Simple AdditiveWeighting Method. In the MFEP and SAW methods decision making is done by giving Subjective andobjective considerations Considered to factors that are important. Reviews These considerations are in the form of weighting the multifactor Involved and are Considered important. With this Analysis and Comparison, it is expected to be Able to find a more suitable method and Be Able to help as a jury assistant to take a decision on the contestants and can help solve the problems in the MusabaqahTilawatil Quran (MTQ) Selection in North Sumatra Province properly.
Implementation Of Data Mining On Suzuki Motorcycle Sales In Gemilang Motor Prosperous With Apriori Algorithm Method: Implementation Of Data Mining On Suzuki Motorcycle Sales In Gemilang Motor Prosperous With Apriori Algorithm Method Anju Eliarsyam Lubis; Paska Marto Hasugian
Journal of Computer Networks, Architecture and High Performance Computing Vol. 2 No. 1 (2020): Computer Networks, Architecture and High Performance Computing
Publisher : Information Technology and Science (ITScience)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/cnapc.v2i1.353

Abstract

The sale is part of the marketing that determine the survival of the company. With the sale, the company can achieve the goals or targets. To be a company that continues to grow in motorcycle sales, the company should be able to compete in increasing sales volume. Starting from the launch prodak the best in sophistication motorcycles, up to a very attractive price cuts the attention of consumers. Things like that already sanggat often do, so the company can still compete, Motorcycles is a two-wheeled transfortasi tool used more and more common people. From teenagers to old orag, not infrequently motorcycle including important sanggat needs. If we do not have it feels very hard in activity quickly. Make sales without any restriction of sales data accumulate, until finally overwhelmed the company in terms of taking care of customer files. To find the most sales required Apriori Algorithm. Apriori algorithm, including the type of association rules on Data Mining. One stage of association that can produce an efficient algorithm is with high frequency pattern analysis. In an association can be determined by two benchmarks, namely: Support and Confidence. Support "penunang value" is the percentage of combinations of items in a database, and Confidence "value certainty" is strong correlation between the items in an association's rules. Apriori algorithm, including the type of association rules on Data Mining. One stage of association that can produce an efficient algorithm is with high frequency pattern analysis. In an association can be determined by two benchmarks, namely: Support and Confidence. Support "penunang value" is the percentage of combinations of items in a database, and Confidence "value certainty" is strong correlation between the items in an association's rules. Apriori algorithm, including the type of association rules on Data Mining. One stage of association that can produce an efficient algorithm is with high frequency pattern analysis. In an association can be determined by two benchmarks, namely: Support and Confidence. Support "penunang value" is the percentage of combinations of items in a database, and Confidence "value certainty" is strong correlation between the items in an association's rules.
The Implementation of the RC4 algorithm For Sale and Purchase Agreements Data Security On Notary Office Trisna Setiawaty; Olven Manahan
Journal of Computer Networks, Architecture and High Performance Computing Vol. 2 No. 1 (2020): Computer Networks, Architecture and High Performance Computing
Publisher : Information Technology and Science (ITScience)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/cnapc.v2i1.354

Abstract

Ksecurity wheel is one of the essential needs of the data, or information. With this regard the importance of the information or data by the party or person of interest. This research aims to design and build a system for data security deed of sale that can help the Notary / PPAT. The system was built using the RC4 (Rivest Code 4) which is a symmetric key cryptographic algorithms and is stream cipher, there is a process of encryption and decryption. The encryption is the process of encoding the original message or plaintext into ciphertext encrypted text. While decryption is the process of encoding back to cipherteksmenjadiplainteks (original data). This research resulted in a system that is able to change the data that can be read into the data that is not easily understood.
Decision Support System Budget Allocation Fund Village With AHP method (Analytic Hierarchy Process) In the village of beehive Ilham Pramuja Nasution; Arjon Samuel Sitio
Journal of Computer Networks, Architecture and High Performance Computing Vol. 2 No. 1 (2020): Computer Networks, Architecture and High Performance Computing
Publisher : Information Technology and Science (ITScience)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/cnapc.v2i1.355

Abstract

The budget allocation of a village fund is very important and take big effect to village progress Because the office to distribute the tax result for village development. But, that allocation is not accurately. Therefore there was design a system to support a decision a budget allocation of village funds by using an Analytical Hierarchy Process (AHP) method. This research done to the make-easy an office village in budgeting is the allocation of village funds. An method of Analytical Hierarchy Process (AHP) is one of a method known as important as the highest level. An AHP method is look for the best alternative
Decision Support System Nutritional Supplement Receipt Determination Method Using Simple Additive Weighting (SAW) Muhammad Irfan Sipayung; Arjon Samuel Sitio
Journal of Computer Networks, Architecture and High Performance Computing Vol. 2 No. 1 (2020): Computer Networks, Architecture and High Performance Computing
Publisher : Information Technology and Science (ITScience)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/cnapc.v2i1.356

Abstract

Nutrition is a component of body builders in order to maintain and repair the tissues so that the function of the body can function properly. Currently in the village broke promontory has run a program providing nutrition food additive in which the program is based as a growth pattern in the village communities are uneven due to the lack of ancestry in consuming foods that are healthy and nutritious. Until now there has been the way of effective work to determine the acceptance of additional nutrients in the village broke headland. This study aims to assist the village in determiningNutritional Supplement acceptance in the village of Tanjung Disconnect. This system is built using a simple method that perogram Additvive weighting that can be done more effectively. Additvive simple weighting method is one method used in decision support seistem prosesperhitungnya by finding the weight values ??for each attribute.
Decision Support System for Determining the Best Hospital Nurses Grandmed Method Using Simple Additive Weighting (SAW) Ester Simanjuntak; bosker Sinaga
Journal of Computer Networks, Architecture and High Performance Computing Vol. 2 No. 1 (2020): Computer Networks, Architecture and High Performance Computing
Publisher : Information Technology and Science (ITScience)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/cnapc.v2i1.357

Abstract

Decision support system is a combination of sources of individual intelligence with the ability of components to improve the quality of decisions. Also decision support systems are computer-based information systems for management decision-making that deal with semi-structural problems. The purpose of this study is to the make the application of nurse employees in Grandmed Hospital Based on the results of research that has been Discussed items, namely the Decision Support System for Determining the Best Nurses in Grandmed Hospital by Using the Simple Additive Wieghting (SAW) Method with the benefit of being Able to Facilitate the processing of the data and Facilitate nurse in Determination of the best nurse for a promotion to a nurse at Grandmed Hospital
Diagnose Expert System Computer Malfunction Certainty Factor Method Djouking Kiray; Fricles Ariwisanto Sianturi
Journal of Computer Networks, Architecture and High Performance Computing Vol. 2 No. 1 (2020): Computer Networks, Architecture and High Performance Computing
Publisher : Information Technology and Science (ITScience)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/cnapc.v2i1.358

Abstract

An expert system is a knowledge base system that solves problems using an expert's knowledge that is entered into a computer, thereby increasing productivity, Because an expert can work faster than a human lay works like an expert. Expert systems Also solve problems by imitating the ways in the which an expert expert offer section with problems in his field, one of the which is in the field of computer repair, the problem of computer damage Becomes a fairly complicated problem, this problem is Generally experienced by individuals and institutions. One of them is in school institutions that have computer laboratories. to diagnose computer use can damage the certainty factor method that helps identify damage to the computer and find the cause of damage to the computer based on the symptoms that occur and the solution to repair it. Certainty Factor is one of the techniques used to deal with uncertainty in decision making. In dealing with a problem, answers are Often found that do not have full certainty. This uncertainty is influenced by two factors items, namely the uncertain rules and user uncertain answers. Uncertain rules are rules of symptoms that are determined for a damage.
Data Security System login With MD5 Algorithms in Applications deskresy.com Rahmat Ferdiansyah; Paska Marto Hasugian
Journal of Computer Networks, Architecture and High Performance Computing Vol. 2 No. 1 (2020): Computer Networks, Architecture and High Performance Computing
Publisher : Information Technology and Science (ITScience)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/cnapc.v2i1.359

Abstract

Cryptography is a technique of data security by processing the data (plaintext) using an encryption method so that the the data can not be read directly, especially by unauthorized parties. Confidential Data and information need to get serious attention considering the value of information contained in it so that procedures are needed to hide the messages stored Therein. Data security Becomes very important at this time, Because for every decision or policy making must be based on the data. Md5 is a substitute for MD4, MD5 is one of the most Widely used one-way hash functions, MD5 processes the input into blocks of 512 bits, the output of md5 is 128 bits and has a fixed length. MD5 algorithm is Widely used for various purposes in making security in applications, it is Often used to help login validation on the use of passwords stored in the database system