cover
Contact Name
Nurul Khairina
Contact Email
nurulkhairina27@gmail.com
Phone
+6282167350925
Journal Mail Official
nurul@itscience.org
Editorial Address
Jl. Setia Luhur Lk V No 18 A Medan Helvetia Tel / fax : +62 822-5158-3783 / +62 822-5158-3783
Location
Kota medan,
Sumatera utara
INDONESIA
Journal of Computer Networks, Architecture and High Performance Computing
ISSN : 26559102     EISSN : 26559102     DOI : 10.47709
Core Subject : Science, Education,
Journal of Computer Networks, Architecture and Performance Computing is a scientific journal that contains all the results of research by lecturers, researchers, especially in the fields of computer networks, computer architecture, computing. this journal is published by Information Technology and Science (ITScience) Research Institute, which is a joint research and lecturer organization and issued 2 (two) times a year in January and July. E-ISSN LIPI : 2655-9102 Aims and Scopes: Indonesia Cyber Defense Framework Next-Generation Networking Wireless Sensor Network Odor Source Localization, Swarm Robot Traffic Signal Control System Autonomous Telecommunication Networks Smart Cardio Device Smart Ultrasonography for Telehealth Monitoring System Swarm Quadcopter based on Semantic Ontology for Forest Surveillance Smart Home System based on Context Awareness Grid/High-Performance Computing to Support drug design processes involving Indonesian medical plants Cloud Computing for Distance Learning Internet of Thing (IoT) Cluster, Grid, peer-to-peer, GPU, multi/many-core, and cloud computing Quantum computing technologies and applications Large-scale workflow and virtualization technologies Blockchain Cybersecurity and cryptography Machine learning, deep learning, and artificial intelligence Autonomic computing; data management/distributed data systems Energy-efficient computing infrastructure Big data infrastructure, storage and computation management Advanced next-generation networking technologies Parallel and distributed computing, language, and algorithms Programming environments and tools, scheduling and load balancing Operation system support, I/O, memory issues Problem-solving, performance modeling/evaluation
Articles 14 Documents
Search results for , issue "Vol. 3 No. 1 (2021): Computer Networks, Architecture and High Performance Computing, January 2021" : 14 Documents clear
Case Study: Mobile-Based Application for The Election of The Student Council President in Tegal City Taufiq Abidin; Slamet Wiyono; Afif Maulana Iskandar
Journal of Computer Networks, Architecture and High Performance Computing Vol. 3 No. 1 (2021): Computer Networks, Architecture and High Performance Computing, January 2021
Publisher : Information Technology and Science (ITScience)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/cnahpc.v3i1.920

Abstract

The development of information technology at this time has brought big changes for humans, including the way to implement voting. The use of computer technology in the conduct of voting is known as electronic voting (E-Voting). With e-voting, the voting process and vote counting have become more effective and efficient. Election of the head of the student organization at school (OSIS) is an annual event that is held regularly at schools. However, elections are still carried out traditionally. In fact, in the technological era, it should be made more practical. This article discusses the making of a mobile-based application for the student council president election in schools in the city of Tegal. The method used is Waterfall. The resulting mobile application is an application that can be used by the school to make elections, where students can choose directly using a smartphone. The blackbox test results show that the application made is in accordance with the initial design. The whitebox test results show that the application has not found an error. As for the usibility test results, the application made was accepted 80%. However, the user does not like the application interface display with a satisfaction score of only 60%.
Implementation of Data Mining Using C4.5 Algorithm on Customer Satisfaction in Tirta Lihou PDAM Titin Handayani Sinaga; Anjar Wanto; Indra Gunawan; Sumarno Sumarno; Zulaini Masruro Nasution
Journal of Computer Networks, Architecture and High Performance Computing Vol. 3 No. 1 (2021): Computer Networks, Architecture and High Performance Computing, January 2021
Publisher : Information Technology and Science (ITScience)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/cnahpc.v3i1.923

Abstract

This application applies the C4.5 Algorithm to decide customer satisfaction, the C4.5 algorithm is one of the algorithms used to classify or segment, or group and it is predictive. This type of research is a classification with the concept of data mining involving 150 customers of PDAM Tirta Lihou in Totap Majawa Kab. Simalungun can be categorized as: "Satisfied and Dissatisfied". The meaning of Data Mining is an interdisciplinary subfield of computer science and statistics with the overall objective of extracting information (with intelligent methods) from data sets and converting information into understandable structures for further use. There are 5 criteria that can affect customer satisfaction, among others: Service Facilities (x1), Price Rates (x2), Smooth Water (x3), Corporate Image (x4), and Location (x5). The results of processing the C4.5 method using the RapidMiner Studio 5.3 software mean that Rapid Miner is a solution for analyzing data mining, text mining, and predictive analysis. Rapid Miner uses various descriptive and predictive techniques in providing insight to users so that they can make the best decisions with the level of accuracy, namely, class recall and class precision values, it is explained that the "Satisfied" category produces a class recall of 97.80% and a class precision of 97.80%. 98.89% and the "Not Satisfied" category resulted in a class recall of 98.31% and a class of precision of 96.67%. And the above accuracy results from the calculation of the C4.5 algorithm is 98.0%. Keywords: C4.5 Algorithm, Data Mining, Customer Satisfaction, PDAM Tirta Lihou
Application of The Levenberg Marquardt Method In Predict The Amount of Criminality in Pematangsiantar City Widya Tri Charisma Gultom; Anjar Wanto; Indra Gunawan; Muhammad Ridwan Lubis; Ika Okta Kirana
Journal of Computer Networks, Architecture and High Performance Computing Vol. 3 No. 1 (2021): Computer Networks, Architecture and High Performance Computing, January 2021
Publisher : Information Technology and Science (ITScience)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/cnahpc.v3i1.926

Abstract

Criminality is an act that violates the law that can disturb society and even harm society both economically and psychologically. The number of crimes cannot be ascertained over time because the numbers are uncertain. So that the police have difficulty in overcoming criminal acts. With this research, the police can find out the number of criminals that will occur through the prediction that has been made. So that the police can prevent the number of criminals and increase security in Pematangsiantar city. This study uses an artificial neural network with the Levenberg Marquardt method. The research data is sourced from the Pematangsiantar Police Criminal Investigation Agency (Reskrim) in 2014-2019. The data is divided into 2 parts, namely training data and testing data. There are 5 architectural models used in this study, namely 3-30-1, 3-31-1, 3-32-1, 3-36-1 and 3-38-1. Of the 5 architectural models used, the best architecture is 3-36-1 with an accuracy rate of 85%, MSE 0.1465119, and a maximum iteration of 10000, the results obtained from the best architecture in 2020 are 85% with the number of criminals 394 people, in 2021 it is 62 % totaled 238 people, in 2022, namely 69% amounted to 170 people, so this model is good for predicting the number of crimes in Pematangsiantar City.
Door Security Design Using Fingerprint and Buzzer Alarm Based on Arduino Mario Junianto Manurung; Poningsih Poningsih; Sundari Retno Andani; Muhammad Safii; Irawan Irawan
Journal of Computer Networks, Architecture and High Performance Computing Vol. 3 No. 1 (2021): Computer Networks, Architecture and High Performance Computing, January 2021
Publisher : Information Technology and Science (ITScience)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/cnahpc.v3i1.929

Abstract

The level of crime of theft in people's homes from time to time is increasing and increasingly unsettling for many people and various groups, from leading sources claiming that there has been an increase in theft in people's homes from the previous year, by conducting research objects in the community by identifying existing problems. It can be concluded that this happens because the house door security system still uses conventional which is classified as unsafe or easily broken into, by carrying out research method steps in the form of analysis and data collection and in the form of designing tools by describing some of the main supporting tools that the problem can be minimized by using technology that is currently developing that is already well systemized, namely using a microcontroller or Arduino as the main control center, assisted by using a fingerprint sensor as a process for recording and identifying fingerprints and NodeMCU for to connect to a WiFI network where later on that the door can also be controlled using android via a wifi network as a remote control and an alarm buzzer which will function if when the fingerprint identification process fails, the alarm will sound as a warning sign, it will be concluded to design a door safety device using arduino based fingerprint and alarm buzzer for better system. Which only fingers that have been registered and registered android can open the door. This research is expected to be able to optimize door security in people's homes to avoid crimes such as thieves.
Centralized and Mapped GIS Web-Based Covid-19 Data Reporting Application with The Waterfall Method: (Case Study: Information Communication Department of North Sumatra Province) Rizki Muliono
Journal of Computer Networks, Architecture and High Performance Computing Vol. 3 No. 1 (2021): Computer Networks, Architecture and High Performance Computing, January 2021
Publisher : Information Technology and Science (ITScience)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/cnahpc.v3i1.930

Abstract

Covid-19 pandemic cases are currently increasing and expanding throughout the world, especially in Indonesia in the province of North Sumatra. Data on the number of cases spread in the province of North Sumatra which is summarized and published, sometimes there are still disputes over the number and lack of organization in the number of records and their distribution, so there are often errors in the data collected by the health department and which will be published to the public. The case study in this research is the design of an information system that regulates the process of recording, moving, accumulating, and mapping GIS data maps to the publication of Positive case data, Patient Under Surveillance, Polymerase Chain Reaction, and Rapid Test results directly through a web-based covid-19 data reporting application. Sourced from each user of every health facility in each district and city from each sub-district in the province of North Sumatra to support the accuracy of data in decision-making built at the North Sumatra Province Information and Communication Office. The method used in developing the application uses the waterfall method, starting from the needs analysis stage, design, implementation to testing until maintenance. The results of the implementation and testing were carried out using the Blackbox and Whitebox methods. Presentation of GIS web data using google maps has not used a threshold value based on a calculated algorithm, but still uses the determination of crisp values so that the results cannot be said to be relevant as a determinant.
Rain Monitoring System for Nutmeg Drying Based on Internet of Things Dirja Nur Ilham; Eri Satria; Fera Anugreni; Rudi Arif Candra; Herma Nugroho Rono Adi Kusumo
Journal of Computer Networks, Architecture and High Performance Computing Vol. 3 No. 1 (2021): Computer Networks, Architecture and High Performance Computing, January 2021
Publisher : Information Technology and Science (ITScience)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/cnahpc.v3i1.933

Abstract

One of the stages in drying the nutmeg is drying the nutmeg in the afternoon which is directly illuminated by the sun. The nutmeg owners in South Aceh is very difficult to get information about rain falling during the day if they are outside or are not in the nutmeg drying area. The process of monitoring the occurrence of rain during the drying of the nutmeg has been done manually by monitoring or seeing the state of the sky when it is cloudy. The purpose of this research is to create a rain monitoring system based on the “Internet of things” internet to make it easier for nutmeg owners to get information about rain falling from a distance. This research uses nodeMCU which functions as a controller of a rain monitoring system, a raindrop sensor as a rain detection sensor. The working system of the rain monitoring tool is by connecting the nodeMCU to the led light and if the raindrop sensor is exposed to rain then the led light will turn on or light up and the raindrop sensor reads the data point. If the data point is read 1024, it indicates that the condition is not raining, while if the data point value is 700 -1023, it indicates the condition of the drizzle, and the data point value from 0-600 indicates the heavy rain condition. The raindrop sensor sends data points to the ThingsIO.AI website as a condition notification that the nutmeg drying area is drizzling, heavy rain, or no rain. For monitoring of nutmeg drying area, it can be accessed remotely via the “website ThingsIO.AI” using smartphones and computers that are connected by the internet. Based on the results of testing the average data point delivery time is 1 minute and the value of the data point obtained is 488-1009
K-Means Algorithm For Clustering Poverty Data in Bangka Belitung Island Province Castaka Agus Sugianto; Tri Pratiwi Olivia Riska Bokings
Journal of Computer Networks, Architecture and High Performance Computing Vol. 3 No. 1 (2021): Computer Networks, Architecture and High Performance Computing, January 2021
Publisher : Information Technology and Science (ITScience)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/cnahpc.v3i1.934

Abstract

The Central Bureau of Statistics is a non-ministerial government institution that reports directly to the President. Based on data from The Central Bureau of Statistics in September 2019, the wealth rate in Indonesia was 9.22% and the number of indigent people in Indonesia reached 24.79 million. The poverty rate in the Bangka Belitung Islands Province was low compared to the national level. This is evidenced by 4.62% of people in Bangka Belitung Island Province were indigent people, which is lower than the national average of 9.22%. The data mining techniques using the K-Means Clustering method are used for this study. The research data was taken from the website of the BPS from 2014-2019 which consisted of 7 districts and/or cities with 3 variables. The variables used are the number of indigent people (in thousands), the average length of school education (years), and adjusted per capita expenditure (thousand rupiahs/year). All data is processed by Rapidminer and 3 clusters are carried out, namely: medium cluster level 0, high cluster level 1, and low cluster level 2. Cluster 0 contains districts/cities whose people have the longest average school time, high per capita expenditure, and a large number of indigent people. Cluster 1 contains districts/cities whose people have a short average school time, low per capita expenditure, a moderate number of indigent people. Cluster 2 contains districts/cities whose people have an average school time, moderate per capita expenditure, a small number of indigent people. Based on the result, the government can prioritize Kabupaten Bangka, Kabupaten Bangka Barat, Kabupaten Bangka Selatan in assisting, especially in the cost of education scholarships and social funds as well as other infrastructure improvements for the welfare of the inhabitants of Bangka Belitung Islands Province.
A Review of Detection of Pest Problem in Rice Farming by using Blockchain and IoT Technologies Taufik Hidayat; Rahutomo Mahardiko
Journal of Computer Networks, Architecture and High Performance Computing Vol. 3 No. 1 (2021): Computer Networks, Architecture and High Performance Computing, January 2021
Publisher : Information Technology and Science (ITScience)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/cnahpc.v3i1.935

Abstract

Pest can be a serious topic in agricultural areas especially rice plantations. The pest destroys the plants before harvesting time. Because of the presence of the pest, the yield of agricultural products is decreasing. From a technical point of view, an agricultural professional should identify not only the type of pest that destroys rice plants but also overcome the pest. This research proposes a paper review on pest detection systems by using Blockchain technology and the Internet of Things involving all parties involved. The use of the review is to have a broad overview regarding the functional combination between IoT and Blockchain technologies to reduce the pest problems. Smart contract technology Blockchain may be held to determine automatic alert in the system and know how to resolve the problem accurately and all information is verified by blockchain system without a human interception. IoT devices can be attached to rice plantations to monitor, determine and send the information of the pests. Our paper explains the combination of IoT and Blockchain technologies in order to improve any possibility of success rate by getting the pests. Thus, IoT replaces human manual checking in pest identification to reduce human error. So that, the harvesting time can be increased and the agriculture yields are good. The search comparison results show that ScienceDirect has the highest search value
Decision Support System Determining Computer Virus Protection Applications Using Simple Additive Weighting (SAW) Method Adi Widarma; M. Dedi Irawan; Fajri Nurhidayahti; Ranis Hsb
Journal of Computer Networks, Architecture and High Performance Computing Vol. 3 No. 1 (2021): Computer Networks, Architecture and High Performance Computing, January 2021
Publisher : Information Technology and Science (ITScience)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/cnahpc.v3i1.936

Abstract

The use of information technology devices such as computers or laptops is currently increasing. The increased use is due to the fact that these devices are very supportive of our daily work activities. With the increasing use of these computers, data security on a computer or laptop device must be completely safe from virus attacks. To ward off viral attacks m aka requires the application of anti-virus to inhibit and prevent a variety of viruses that enter into the computer system so that the computer user's activity was not bothered by the many viruses are easily spread. Because there are too many antiviruses on the market, it is necessary to choose a good antivirus. One of the ways to choose antivirus is the existence of a decision support system . In this study, the Simple Additive Weighting (SAW) method was applied for the anti-virus application selection system. This data assessment analysis aims to produce the best anti - virus application options that computer users can use to secure their computer data. The criteria and weights used are K1 = application rating (5%) , K2 = completeness of features (30%) , K3 = price / official license (5%) , K4 = malware detection (45%) and K5 = blocking URL (15%). Of the 25 alternatives used, the results of the study, namely alternative A1 = Kaspersky anti-virus get the highest ranking result.
Combination of Decision Tree and K-Means Clustering Methods for Decision Making of BLT Recipients in the Covid-19 Period Jani Kusanti; Djoko Sutanto
Journal of Computer Networks, Architecture and High Performance Computing Vol. 3 No. 1 (2021): Computer Networks, Architecture and High Performance Computing, January 2021
Publisher : Information Technology and Science (ITScience)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/cnahpc.v3i1.937

Abstract

The economic conditions during the Covid-19 outbreak had an impact on society globally. The number of people who have experienced layoffs has an impact on the economic conditions of the family. The economic impact that helps the community encourages the government to increase efforts to increase social assistance in the form of BLT. However, the distribution of BLT was not right on target, there were still many people who really could not afford not to receive BLT, while those who were still able to get BLT assistance. Therefore, it is important in this study to use a combination of the K-Means Cluster and Decision Tree methods to be used in BLT recipient decision making, with the aim of increasing BLT recipients as expected. The calculation results were obtained using a combination of the K-Means Cluster and Decision Tree methods referring to the criteria for the community who has the right to receive data with an error level of -2.476190476 <from error tolerance 6.84.

Page 1 of 2 | Total Record : 14