cover
Contact Name
Nurul Khairina
Contact Email
nurulkhairina27@gmail.com
Phone
+6282167350925
Journal Mail Official
nurul@itscience.org
Editorial Address
Jl. Setia Luhur Lk V No 18 A Medan Helvetia Tel / fax : +62 822-5158-3783 / +62 822-5158-3783
Location
Kota medan,
Sumatera utara
INDONESIA
Journal of Computer Networks, Architecture and High Performance Computing
ISSN : 26559102     EISSN : 26559102     DOI : 10.47709
Core Subject : Science, Education,
Journal of Computer Networks, Architecture and Performance Computing is a scientific journal that contains all the results of research by lecturers, researchers, especially in the fields of computer networks, computer architecture, computing. this journal is published by Information Technology and Science (ITScience) Research Institute, which is a joint research and lecturer organization and issued 2 (two) times a year in January and July. E-ISSN LIPI : 2655-9102 Aims and Scopes: Indonesia Cyber Defense Framework Next-Generation Networking Wireless Sensor Network Odor Source Localization, Swarm Robot Traffic Signal Control System Autonomous Telecommunication Networks Smart Cardio Device Smart Ultrasonography for Telehealth Monitoring System Swarm Quadcopter based on Semantic Ontology for Forest Surveillance Smart Home System based on Context Awareness Grid/High-Performance Computing to Support drug design processes involving Indonesian medical plants Cloud Computing for Distance Learning Internet of Thing (IoT) Cluster, Grid, peer-to-peer, GPU, multi/many-core, and cloud computing Quantum computing technologies and applications Large-scale workflow and virtualization technologies Blockchain Cybersecurity and cryptography Machine learning, deep learning, and artificial intelligence Autonomic computing; data management/distributed data systems Energy-efficient computing infrastructure Big data infrastructure, storage and computation management Advanced next-generation networking technologies Parallel and distributed computing, language, and algorithms Programming environments and tools, scheduling and load balancing Operation system support, I/O, memory issues Problem-solving, performance modeling/evaluation
Articles 14 Documents
Search results for , issue "Vol. 3 No. 1 (2021): Computer Networks, Architecture and High Performance Computing, January 2021" : 14 Documents clear
Implementation of HSV- based Thresholding Method for Iris Detection Fajrul Islami
Journal of Computer Networks, Architecture and High Performance Computing Vol. 3 No. 1 (2021): Computer Networks, Architecture and High Performance Computing, January 2021
Publisher : Information Technology and Science (ITScience)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/cnahpc.v3i1.939

Abstract

Image thresholding is one of the most frequently used methods in image processing to perform digital image processing. Image thresholding has a technique that can separate the image object from its background. This is a technique that is quite good and effective for segmenting love. In this study, the threshold method used will be combined with the HSV mode for color detection. The threshold method will separate the object and the image background, while HSV will help improve the segmentation results based on the Hue, Saturation, Value values to be able to detect objects more accurately. Segmentation is carried out using the original input image without pre-processing or direct segmentation. As we know that in digital image processing, there are steps that are usually done to get a good input image, namely pre-processing. In this pre-processing stage, processes such as image conversion and image intensity changes are carried out so that the input image is better. Therefore, even though the input image is used without going through the pre-processing stage, the object can be segmented properly based on the color type of the object. The results of this segmentation can later be used for recognition and identification of image objects. The results of the test method for object segmentation achieved a color similarity level of 25%, with an accuracy rate of 75% in detecting uniform color objects. So that this method can be one of the most effective methods in segmenting image objects without pre-processing or direct thresholding
Implementation of Simple Additive Weighting in Providing Micro Business Loans at Bank Mandiri Pematangsiantar Sahat Sonang Sitanggang; Erwin Sirait
Journal of Computer Networks, Architecture and High Performance Computing Vol. 3 No. 1 (2021): Computer Networks, Architecture and High Performance Computing, January 2021
Publisher : Information Technology and Science (ITScience)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/cnahpc.v3i1.948

Abstract

Banks are institutions and institutions that are organizations and institutions in Indonesia and have an important role in the sustainability of the Indonesian economy. Bank Mandiri is one of the banks that provides micro business credit facilities to the business world. The higher the public's interest in getting micro business credit, the banks need software to help determine who is entitled to credit. In order to produce a proper feasibility analysis, a method of decision-making in overcoming these problems is needed so that determining who is entitled to receive credit is not too long and efficient in reducing credit risk. Problems arise in the decision-making process for granting micro-business loans, namely the inaccuracy of micro-business credit recipients. The above problems can be resolved by building a Decision Support System which can assist decision makers in assessing and selecting micro business loans using variables: Income, Collateral, Loan Limit, Installments, Length of Business, Number of Dependents. The system built by applying the Simple Additive Weighting method is known as the method of adding weight. The Simple Additive Weighting method requires a decision matrix normalization process  to a scale that can be compared with all available alternative ratings. This will be a reference in ranking and consider the advantages and disadvantages of applying for a credit loan in order to find the desired candidate. From the test results using 10 data samples, it was obtained that the first rank was received credit on behalf of A5 with a value of 9.33, and the last rank was on behalf of A6 with a value of 6.4. and very helpful in solving problems faced by Bank Mandiri Pematangsiantar.
Design of captive portal LAN with redundancy connections Arie Budiansyah; Dirja Nur Ilham; Rudi Arif Candra
Journal of Computer Networks, Architecture and High Performance Computing Vol. 3 No. 1 (2021): Computer Networks, Architecture and High Performance Computing, January 2021
Publisher : Information Technology and Science (ITScience)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/cnahpc.v3i1.998

Abstract

Captive portal networks are in great demand because users have privileged authentication in the form of usernames and passwords to enter the LAN network without having to share with other users. However, the captive portal network is difficult to implement redundant connection because it must be in the form of a ring topology and the application of a bridge network. Captive portal is a web page for the authentication process to enter the network where the authentication back end can use radius, kerberos, ldap with the AAA framework. Meanwhile, fault tolerance is a redundant connection mechanism as an alternative path provider if the main path is broken. Here there is a tiered mechanism so that fault tolerance can be implemented into the captive portal network. This study describes the process of designing a captive portal network starting from analyzing, conceptualizing and finally designing the network itself. The final result of this research is 2 pieces of redundancy connection network design to the captive portal framework.
Motion capture in humanoid model with Unity engine using Kinect V2 Amir Mahmud Husein; Jimmy Ciawi
Journal of Computer Networks, Architecture and High Performance Computing Vol. 3 No. 1 (2021): Computer Networks, Architecture and High Performance Computing, January 2021
Publisher : Information Technology and Science (ITScience)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/cnahpc.v3i2.1067

Abstract

Animation is a technique to create illusion of motion, which is created by displaying a series of motionless pictures in sequence or using a spine/bones to create motion that looks real. All this time, the process of creating an animation still using traditional technique which requires special skills and take some time to finish a complicated animation which is used in movies or video games. Motion capture is an animation-making technique by tracking every part of body in order to find position and rotation of human’s joints which is generated by the image from the sensor. Motion capture has lots of method, such as marker base technique which use mark to track any motions. Motion capture markerless method that can capture or track motions without using any marks. Motion capture with markerless technique can be done by using RGB-Depth’s camera censor, which is by using Microsoft Kinect V2 with Kinect V2 SDK in order to make Kinect connected with computer, and using Unity Engine, a game engine that has already provided animation timeline and supports any 3D format which contains animation file that can be used in mostly other models which is using humanoid. In order to obtain motion data which will be changed into skeleton joint data, we will use connector OpenNI and 3D Collada model with (.dae) format because Collada is 3D format Open Source which is built using XML-based so that it can easily read and written back into 3D file as an output.

Page 2 of 2 | Total Record : 14