cover
Contact Name
Nurul Khairina
Contact Email
nurulkhairina27@gmail.com
Phone
+6282167350925
Journal Mail Official
nurul@itscience.org
Editorial Address
Jl. Setia Luhur Lk V No 18 A Medan Helvetia Tel / fax : +62 822-5158-3783 / +62 822-5158-3783
Location
Kota medan,
Sumatera utara
INDONESIA
Journal of Computer Networks, Architecture and High Performance Computing
ISSN : 26559102     EISSN : 26559102     DOI : 10.47709
Core Subject : Science, Education,
Journal of Computer Networks, Architecture and Performance Computing is a scientific journal that contains all the results of research by lecturers, researchers, especially in the fields of computer networks, computer architecture, computing. this journal is published by Information Technology and Science (ITScience) Research Institute, which is a joint research and lecturer organization and issued 2 (two) times a year in January and July. E-ISSN LIPI : 2655-9102 Aims and Scopes: Indonesia Cyber Defense Framework Next-Generation Networking Wireless Sensor Network Odor Source Localization, Swarm Robot Traffic Signal Control System Autonomous Telecommunication Networks Smart Cardio Device Smart Ultrasonography for Telehealth Monitoring System Swarm Quadcopter based on Semantic Ontology for Forest Surveillance Smart Home System based on Context Awareness Grid/High-Performance Computing to Support drug design processes involving Indonesian medical plants Cloud Computing for Distance Learning Internet of Thing (IoT) Cluster, Grid, peer-to-peer, GPU, multi/many-core, and cloud computing Quantum computing technologies and applications Large-scale workflow and virtualization technologies Blockchain Cybersecurity and cryptography Machine learning, deep learning, and artificial intelligence Autonomic computing; data management/distributed data systems Energy-efficient computing infrastructure Big data infrastructure, storage and computation management Advanced next-generation networking technologies Parallel and distributed computing, language, and algorithms Programming environments and tools, scheduling and load balancing Operation system support, I/O, memory issues Problem-solving, performance modeling/evaluation
Articles 18 Documents
Search results for , issue "Vol. 7 No. 4 (2025): Articles Research October 2025" : 18 Documents clear
Implementation of Machine Learning Models for Predicting Internet Service Provider Customer Churn Asyhari, Moch Yusuf; Susanti, Pratiwi; Yunitasari, Yessi
Journal of Computer Networks, Architecture and High Performance Computing Vol. 7 No. 4 (2025): Articles Research October 2025
Publisher : Information Technology and Science (ITScience)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/cnahpc.v7i4.7012

Abstract

The telecommunications industry faces an extremely high level of competition, where the phenomenon of customer churn presents a significant challenge due to its impact on revenue decline and increased costs associated with acquiring new customers. This study aims to develop a churn prediction model using the Decision Tree algorithm and implement it in a web-based application to support customer retention strategies. The CRISP-DM methodology is employed, covering Business Understanding, Data Understanding, Data Preparation, Modeling, Evaluation, and Deployment. Experimental results show that the Decision Tree algorithm demonstrates strong performance in identifying non-churn customers, with a precision of 0.82, a recall of 0.91, and an F1-score of 0.86. However, its performance on the churn class remains limited, with a precision of 0.63, a recall of 0.44, and an F1-score of 0.52, highlighting the importance of addressing imbalanced data distribution to preserve existing data. The model underwent Learning Curve and Validation Curve analysis. The Learning Curve indicates a relatively stable model with a small gap, suggesting good generalization. The Validation Curve reveals that optimal performance is achieved at a moderate tree depth, avoiding the risk of overfitting at greater depths. Nevertheless, the main advantage of the Decision Tree is its interpretability, which highlights significant factors such as contract type, subscription duration, and additional services. The integration of the model into a web-based application also provides practical benefits through rapid churn risk monitoring, supporting the company’s strategic decision-making.
User Interface Analysis Using the Heuristic Evaluation Method in the Astra International Cooperative Application (KAI Apps) Zaelani, Ahmad; Banowosari , Lintang Yuniar
Journal of Computer Networks, Architecture and High Performance Computing Vol. 7 No. 4 (2025): Articles Research October 2025
Publisher : Information Technology and Science (ITScience)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/cnahpc.v7i4.7035

Abstract

This study aims to analyze the usability of the user interface in the Astra International Cooperative (KAI Apps) application using the Heuristic Evaluation method. A quantitative approach was applied through observation of the application and distribution of a Google Form-based questionnaire to 100 respondents selected using the Slovin formula from a population of 100,000 users. The research instrument consisted of 30 statements compiled based on Nielsen's ten Heuristic Evaluation principles, such as visibility of system status, consistency and standards, error prevention, and help and documentation. The data was analyzed using validity and reliability tests, as well as descriptive percentage analysis using SPSS software. The results showed that the Astra Cooperative application scored 86.78%, which is classified as very high, with nine out of ten usability principles rated as good by the majority of respondents. These findings indicate that the application is capable of providing a positive experience for users in accessing cooperative services digitally. However, weaknesses were still found in the aspects of help and documentation, which were considered unclear and not entirely relevant, so that development in the form of tutorials, FAQs, and interactive guides is needed to optimize the user experience.
User Experience Analysis of Employee Attendance List on Talent Application with Heuristic Evaluation Method Anjani, Dini; Mustikasari, Metty
Journal of Computer Networks, Architecture and High Performance Computing Vol. 7 No. 4 (2025): Articles Research October 2025
Publisher : Information Technology and Science (ITScience)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/cnahpc.v7i4.7036

Abstract

The development of digital technology has influenced human resource management systems, particularly in the management of employee attendance records. One of the most widely used applications in Indonesia is Mekari Talenta, a cloud-based HRIS platform with features ranging from online attendance, leave, overtime, to payroll integration. Despite its high rating on the Google Play Store, there are still a number of complaints regarding user experience, such as confusing navigation, an unintuitive interface, and difficulty in accessing certain features. This study aims to analyze the user experience on the Talenta application using the Heuristic Evaluation method based on Nielsen's 10 principles. Data collection was conducted through questionnaires and processed using SPSS for validity, reliability, and descriptive percentage analysis. The results of the study show that most of the Heuristic Evaluation principles scored in the "Good" category, especially in terms of visibility of system status, consistency and standards, and aesthetic and minimalist design. However, there are still weaknesses in terms of help and documentation as well as error prevention that need improvement. These findings recommend that developers improve the interface display, clarify the help documentation, and optimize the error prevention feature so that the application can provide a more optimal user experience. Further research is recommended using other evaluation methods, such as the User Experience Questionnaire (UEQ) or in-depth interviews, to obtain a more comprehensive picture.
Does Implementing Cryptography in Financial Risk Management Systems Reduce Data Security Risks – Literature Study Gultom, Riris Rollyna
Journal of Computer Networks, Architecture and High Performance Computing Vol. 7 No. 4 (2025): Articles Research October 2025
Publisher : Information Technology and Science (ITScience)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/cnahpc.v7i4.7053

Abstract

ABSTRACT This study investigates the use of cryptography in financial risk management systems to determine how well it mitigates data security risks. A key issue raised is the increasing threat to the integrity and privacy of financial data in the digital age, which requires more robust and flexible protection mechanisms. The objective is to determine the extent to which cryptographic techniques can enhance financial risk management systems and mitigate the possibility of data leakage and manipulation. The approach used is a literature review of various academic journals, scientific publications, and industry reports that discuss the integration of cryptography in the financial and information security domains. The study's findings indicate that cryptographic algorithms, such as AES, RSA, and blockchain-based encryption, can increase system resilience against cyberattacks while enhancing audit trails and access control. The implication of these findings is that the use of cryptography not only enhances data security but also increases stakeholder confidence in digital financial systems. To address the increasingly complex challenges of data security, this study suggests the creation of a set of cryptography policies and implementation standards integrated within a financial risk management framework. The analysis shows that cryptography plays a crucial role in maintaining the confidentiality, integrity, and authentication of financial data and can strengthen risk control systems against data leaks and manipulation. However, there is a gap in the literature regarding the integration of cryptography with a comprehensive risk management framework, as well as a lack of comparative evaluation of the effectiveness of various cryptographic techniques in the context of financial operations. Keywords: Blockchain; data security; cryptography; digital financial system; encryption
Needs Analysis for Chatbot-Based Final Project Administration: A Qualitative Study at STT Terpadu Nurul Fikri Mentari, Laisa Nurin
Journal of Computer Networks, Architecture and High Performance Computing Vol. 7 No. 4 (2025): Articles Research October 2025
Publisher : Information Technology and Science (ITScience)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/cnahpc.v7i4.6973

Abstract

The administration of undergraduate theses involves multiple stakeholders, including final-year students, academic supervisors, heads and vice-heads of study programs, program staff, and BAAK staff. This process often faces various challenges such as delays in information delivery, errors in form filling, inconsistencies in document format, and numerous repetitive questions regarding procedures and requirements. This issue adds to the workload of administrative staff and has the potential to hinder the timely completion of students' final projects. This research aims to analyze the needs and challenges in final project administration and identify the potential use of chatbot technology as a technology-based solution. The approach used is descriptive qualitative thru interviews, observations, and document analysis involving final-year students, supervising lecturers, and administrative staff. The research results indicate that chatbots have the potential to improve administrative efficiency by providing quick and accurate access to procedural information, document templates, guides, schedules, and motivational support. Thus, chatbots can function as interactive assistants that reduce staff workload, minimize miscommunication, and support the successful completion of final projects at STT Terpadu. Nurul Fikri. The novelty of this research lies in its focus on the needs analysis stage before chatbot implementation, which is still rarely done in previous studies. This approach provides a more structured basis for designing contextual and effective chatbot-based administrative systems in higher education environments.  
A Evaluation of the Use of Web-Based Library Management System at I Gusti Bagus Sugriwa State Hindu University Denpasar Muliani, Ni Made; Kartika, Luh Gede Surya
Journal of Computer Networks, Architecture and High Performance Computing Vol. 7 No. 4 (2025): Articles Research October 2025
Publisher : Information Technology and Science (ITScience)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/cnahpc.v7i4.7021

Abstract

Libraries as the heart of higher education play a vital role in supporting the Tri Dharma, particularly in academic and research development. The advancement of information technology demands innovation in library services, one of which is the adoption of Web-Based Library Management Systems (WLMS). This study, entitled Evaluation of the Use of Web-Based Library Management System at I Gusti Bagus Sugriwa State Hindu University, Denpasar, aims to evaluate the effectiveness, challenges, and strategic significance of WLMS implementation using the Technology Acceptance Model (TAM) and the Technology–Organization–Environment (TOE) framework. A sequential explanatory design was applied, combining quantitative surveys and qualitative interviews with 39 respondents consisting of librarians, lecturers, and students. Quantitative findings indicate very good results in perceived usefulness (PU), attitude toward use (ATU), behavioral intention (BI), and actual use (AU), while perceived ease of use (PEOU) scored in the “good” category. TOE-based analysis reveals supporting factors such as infrastructure availability, leadership commitment, and system accessibility, while inhibiting factors include unstable internet, data security concerns, insufficient training, and low digital literacy among users. These results demonstrate that although WLMS significantly improves accessibility, efficiency, and digital literacy, its sustainability requires continuous system optimization, technical support, and human resource development. This research concludes that WLMS adoption at I Gusti Bagus Sugriwa State Hindu University is largely successful but still needs strategic interventions to ensure long-term effectiveness and integration with the university’s mission of advancing Hindu knowledge and culture in the digital era.
IoT-Based Smart Water Quality Monitoring System for Early Detection of Water Pollution in Batam City Candra, Joni Eka; Hazimah , Hazimah
Journal of Computer Networks, Architecture and High Performance Computing Vol. 7 No. 4 (2025): Articles Research October 2025
Publisher : Information Technology and Science (ITScience)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/cnahpc.v7i4.7115

Abstract

Water pollution poses a significant threat to public health, particularly in rapidly developing urban areas such as Batam City, where domestic and industrial activities continue to increase. This study aims to analyse and monitor the quality of household tap water in Batam City over a 30-day period using an Internet of Things (IoT)-based smart water quality monitoring system. The research focuses on two key parameters, namely Total Dissolved Solids (TDS) and water temperature, which serve as primary indicators of water purity. Data were collected daily through a TDS sensor and a DS18B20 digital temperature sensor integrated into an IoT platform for continuous monitoring and real-time data acquisition. The results revealed that the water temperature ranged between 28–29 °C, indicating normal conditions for tropical regions and conforming to clean water standards. The TDS values varied from 310 to 355 ppm, remaining below the World Health Organization (WHO) safety limit of 500 ppm. Although slight fluctuations in TDS levels were observed during the observation period, no readings exceeded the acceptable threshold. These findings suggest that household tap water in Batam City is still safe for consumption and daily use. The study concludes that the application of IoT-based monitoring systems offers an effective approach for real-time water quality supervision and recommends regular monitoring along with the use of filtration devices to ensure long-term water safety and sustainability
Design and Implementation of a File Encryption System Based on Object-Oriented Programming Using C++ Jimmy, Jimmy`
Journal of Computer Networks, Architecture and High Performance Computing Vol. 7 No. 4 (2025): Articles Research October 2025
Publisher : Information Technology and Science (ITScience)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/cnahpc.v7i4.7211

Abstract

Data security has become a critical aspect in the digital era, especially in protecting confidential files from unauthorized access. This study aims to design and implement a file encryption system based on Object-Oriented Programming (OOP) principles using the C++ programming language. The system is developed by applying the core concepts of OOP, namely encapsulation, inheritance, and polymorphism, to create a modular and reusable software architecture. The encryption process is implemented using symmetric key algorithms, allowing users to encrypt and decrypt text-based files securely. The program design follows a layered class structure, where each class handles specific functionalities such as key generation, file reading and writing, and cryptographic operations. The implementation is conducted in a console-based environment with a focus on simplicity, efficiency, and maintainability of the source code. The evaluation results show that the OOP-based approach enhances the flexibility of system modification and reduces code redundancy compared to traditional procedural programming. Furthermore, performance testing demonstrates that the encryption and decryption processes can be executed efficiently without significant latency for small to medium-sized files. This research concludes that applying OOP concepts in C++ provides a structured and scalable framework for developing secure and maintainable encryption systems, which can be further enhanced for larger-scale or GUI-based applications in the future.

Page 2 of 2 | Total Record : 18