cover
Contact Name
Nurul Khairina
Contact Email
nurulkhairina27@gmail.com
Phone
+6282167350925
Journal Mail Official
nurul@itscience.org
Editorial Address
Jl. Setia Luhur Lk V No 18 A Medan Helvetia Tel / fax : +62 822-5158-3783 / +62 822-5158-3783
Location
Kota medan,
Sumatera utara
INDONESIA
Journal of Computer Networks, Architecture and High Performance Computing
ISSN : 26559102     EISSN : 26559102     DOI : 10.47709
Core Subject : Science, Education,
Journal of Computer Networks, Architecture and Performance Computing is a scientific journal that contains all the results of research by lecturers, researchers, especially in the fields of computer networks, computer architecture, computing. this journal is published by Information Technology and Science (ITScience) Research Institute, which is a joint research and lecturer organization and issued 2 (two) times a year in January and July. E-ISSN LIPI : 2655-9102 Aims and Scopes: Indonesia Cyber Defense Framework Next-Generation Networking Wireless Sensor Network Odor Source Localization, Swarm Robot Traffic Signal Control System Autonomous Telecommunication Networks Smart Cardio Device Smart Ultrasonography for Telehealth Monitoring System Swarm Quadcopter based on Semantic Ontology for Forest Surveillance Smart Home System based on Context Awareness Grid/High-Performance Computing to Support drug design processes involving Indonesian medical plants Cloud Computing for Distance Learning Internet of Thing (IoT) Cluster, Grid, peer-to-peer, GPU, multi/many-core, and cloud computing Quantum computing technologies and applications Large-scale workflow and virtualization technologies Blockchain Cybersecurity and cryptography Machine learning, deep learning, and artificial intelligence Autonomic computing; data management/distributed data systems Energy-efficient computing infrastructure Big data infrastructure, storage and computation management Advanced next-generation networking technologies Parallel and distributed computing, language, and algorithms Programming environments and tools, scheduling and load balancing Operation system support, I/O, memory issues Problem-solving, performance modeling/evaluation
Articles 795 Documents
Implementation of The K-Nearest Neighbor Method to Determine The Quality of Export Import Swallow's Nest Benny Johanes; Delpy Nisma Mendrofa; Oloan Sihombing
Journal of Computer Networks, Architecture and High Performance Computing Vol. 4 No. 1 (2022): Article Research Volume 4 Number 1, Januay 2022
Publisher : Information Technology and Science (ITScience)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/cnahpc.v4i1.1281

Abstract

In this study discusses the quality of the feasibility of swallow's nests that are suitable for export, Based on the problem from the research, it discusses how to select export-worthy swallow's nests in order to maintain the confidence of buying from abroad. The method used in this research is the K-NN method which can determine the feasibility of applying for the rank of lecturer. The data that is processed is 100, the input criteria for bowl 4, broken 2, destroyed a 2, destroyed b 2. This system succeeded in displaying appropriate and inappropriate results for lecturer data that had been input into the data set.
Digital Image Copyright Protection with Spatial Domain Public Image Watermarking Scheme Mawaddah Harahap; Johannes Rianto Malau; Tentus Natoka Simangungsong; Davin Winata; David Hadyanto
Journal of Computer Networks, Architecture and High Performance Computing Vol. 4 No. 1 (2022): Article Research Volume 4 Number 1, Januay 2022
Publisher : Information Technology and Science (ITScience)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/cnahpc.v4i1.1335

Abstract

The resulting digital image certainly has the copyright attached to the image. There needs to be protection of digital image works because the form of storage of digital imagery works that are vulnerable to piracy, claims of unauthorized authorities, illegal duplication, or unauthorized modification. The Spatial Domain Public Image Watermarking method is used to protect digital imagery using applications designed to facilitate the watermarking process on several different digital images as well as with different image formats. The reason for using this method is because it has low complexity. In this study, it consisted of three processes carried out, namely the process of making watermarking, the process of checking watermarking and comparison of input imagery and image results. In the process of making watermarking do image input as a watermarking media, input inserted imagery in the form of binary images / text, key inputs and watermark results. In process of checking watermarking performs image input that becomes watermark media, watermark results input, key input, and checking results. The process of creating watermarking takes a relatively short time while the process of extracting watermarking processing time depends on the size of the image file. From some image testing conducted using imagery with three formats, namely: JPG with an average time accuracy of 9:5,310(42.15%), .GIFs with an average time of 8:27.207(21.63%), and. BMP has an average time accuracy of 5:2.989(36.22%). Thus, the determination of the image format used is adjusted to the original image, so that it can perform time efficiency.
Implementation of Wireshark Application in Data Security Analysis on LMS Website I Kadek Noppi Adi Jaya; Ida Ayu Utari Dewi; Gede Surya Mahendra
Journal of Computer Networks, Architecture and High Performance Computing Vol. 4 No. 1 (2022): Article Research Volume 4 Number 1, Januay 2022
Publisher : Information Technology and Science (ITScience)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/cnahpc.v4i1.1345

Abstract

Data security issues are an important aspect of data and information communication over networks. In addition, it is also necessary to look at the security side of the software. In addition to software, computers have an internet protocol in the form of HTTP which is commonly used to access websites. On the LMS website, students have access to lecture materials, discussion forums with lecturers and access to assignments given by lecturers. Wireshark is used to analyze network protocols, can log all packets going through and display detailed data. The purpose of this study is to use a Wireshark application to sniff LMS and pinpoint vulnerabilities in the system. The results of the sniffing process carried out using Wireshark on an LMS that uses the HTTP protocol clearly indicate the absence of encryption and expose the risk of vulnerabilities to the system. Recommendations given to LMS are the use of HTTPS protocol, implementation of Multi Factor Authentication, website log monitoring and password management. Recommended password management are periodic password changes, standardization policies for the use of characters in passwords and password hashing. It is hoped that when the recommendations are implemented it will improve security on the LMS website and reduce risks in data communications
Information Technology Governance Analysis Of Stmik Palcomtech In The New Normal Era Using Cobit 2019 Method Fahmi Ajismanto; Surahmat Surahmat
Journal of Computer Networks, Architecture and High Performance Computing Vol. 3 No. 2 (2021): Journal of Computer Networks, Architecture and High Performance Computing, July
Publisher : Information Technology and Science (ITScience)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/cnahpc.v3i2.1097

Abstract

The pandemic conditions experienced by the world today inevitably force us to practice social distance so that gatherings involving large numbers of people must be avoided first. In universities, especially in the city of Palembang, the use of information technology and learning media is mandatory due to the decision of the minister of education which requires universities to carry out online learning activities. So that information technology governance during a pandemic also has a major influence in the implementation of teaching and learning activities in universities to ensure the quality of the learning and teaching process carried out so that it must be known the shortcomings and advantages of governance which is carried out by conducting further analysis of technology governance in accordance with with the initial goal of education at the university. The method that can be used is to apply the Cobit 2019 where with this method the current maturity level can be known in the application of information technology. The research method in this study uses a descriptive-quantitative method by describing the indicators used as the basis for measurement taken by the Cobit 2019 literature. This study discusses information technology governance form of Design Factor 1 (Enterprise Strategy) to Design Factor 10 (Technology Adoption Strategy) with the result that there are 13 important processes out of 40 total processes in the Cobit 2019 domain that must be considered at STMIK Palcomtech, namely EDM03, APO08, DSS05 EDM02, APO04, APO09, APO12, APO13, BAI01, BAI02, BAI03, BAI06 , MEA03
Comparison of Evaluation Image Segmentation Metrics on Sasirangan Fabric Pattern Finki Dona Marleny; Mambang Mambang
Journal of Computer Networks, Architecture and High Performance Computing Vol. 4 No. 2 (2022): Article Research Volume 4 Number 2, July 2022
Publisher : Information Technology and Science (ITScience)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/cnahpc.v4i2.1479

Abstract

Sasirangan fabric is a typical fabric from the South Kalimantan area. Sasirangan fabric patterns or motifs have a unique archetype that is different from other typical fabrics in Indonesia. The design of Sasirangan fabric is formed from the process of juju or seam. The pattern of Sasirangan fabric that has this uniqueness can be segmented into a more meaningful shape so that it is easy to analyze. The image segmentation that will be tested is the basic pattern of Sasirangan fabric with a random sample to compare the results of the evaluation of the metric evaluation of the image segmentation process from the Sasirangan fabric pattern. Image segmentation is a different segmentation with certain characteristics, namely using the compact watershed approach, canny filter, and morphological geodesic active contours method in the evaluation of image segmentation metrics using precision-recall, which serves to evaluate the quality of the classifier's output. After the image segmentation process is evaluated, the Sasirangan fabric pattern is grouped using the K-means algorithm as a different labelling strategy. This labelling process uses the K-means algorithm to better match details but can be unstable because it relies on random initialization. Alternatives to balance the unstable labelling process using the means algorithm can use discretization. The addition of the K-means method with discretization can create fields with geometric shapes that are pretty flat. The segmentation with Sasirangan fabric with a full motif or data number four 741.78s, results in processing the fastest and the longest computational time on data number two 120.79s.
Performance Comparison Supervised Machine Learning Models to Predict Customer Transaction Through Social Media Ads Afandi Nur Aziz Thohari; Rima Dias Ramadhani
Journal of Computer Networks, Architecture and High Performance Computing Vol. 4 No. 2 (2022): Article Research Volume 4 Number 2, July 2022
Publisher : Information Technology and Science (ITScience)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/cnahpc.v4i2.1488

Abstract

The application of machine learning has been used in various sectors, one of which is digital marketing. This research compares the performance of six machine learning algorithms to predict customer transaction decisions. The six algorithms used for comparison are Perceptron, Linear Regression, K-Nearest Neighbors, Naïve Bayes, Decision Tree, and Random Forest. The dataset is obtained from Facebook ads transaction data in 2020. The goal is to get a model that has the best performance so that it can be deployed to the web. The method that is used to compare the results is a confusion matrix and also uses visualization of the model to get the prediction error that occurred. Based on the test results, the random forest algorithm has the highest accuracy, recall, and f1-score values, with scores of 96.35%, 95.45%, and 93.32%. The highest precision value was generated by the logistic regression algorithm, which was 94.44%. Based on the data visualization presented by the random forest algorithm, it has the least prediction errors, there are four data. Therefore, it can be concluded that the random forest algorithm has the best performance because it has the highest value in the three confusion matrix measurements and the smallest data prediction error. The model of the random forest algorithm is deployed to the web platform and can be accessed at the link iklan-sosmed.herokuapp.com.
Recognition of Regional Traditional House in Indonesia Using Convolutional Neural Network (CNN) Method Meriska Defriani; Irsan Jaelani
Journal of Computer Networks, Architecture and High Performance Computing Vol. 4 No. 2 (2022): Article Research Volume 4 Number 2, July 2022
Publisher : Information Technology and Science (ITScience)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/cnahpc.v4i2.1562

Abstract

Indonesia is a country that has a lot of cultural diversity. This cultural diversity needs to be preserved. If this is not done, the culture that is owned by Indonesia can slowly disappear. The reduction in cultural values can also reduce the sense of belonging to the culture. This lack of sense of ownership makes it easy for other nations to make claims on the culture that is owned by Indonesia. Indonesia will lose its characteristics as a country that has a lot of cultural diversity. One of the efforts to preserve culture is to recognize the characteristics of each culture and be able to recognize the differences between one culture and another. For example, recognizing traditional houses from various ethnic groups based on their image. In this research, the image classification of the characteristics of traditional houses from several ethnic groups in Indonesia was carried out. The classification used to identify an image. In this study, deep learning techniques are used with the Convolutional Neural Network (CNN) algorithm and Keras framework. This CNN use several layers namely convolutional, pooling, flatten, and dense layer. The development of deep learning models uses the Knowledge Discovery in Database (KDD) method. This method consists of nine stages. The built model is evaluated using k-fold cross validation with a k value of 5 and produces an average accuracy of 80%. This shows that the model built is capable of classifying well. The built model is evaluated with 3 different epoch values, namely 50, 75, and 100. The larger the epoch value used, the greater the accuracy value. The model built is also able to make predictions with an accuracy of 80%.
Implementation of K-Medoids Clustering Method for Indihome Service Package Market Segmentation Juniar Hutagalung; Muhammad Syahril; Sobirin Sobirin
Journal of Computer Networks, Architecture and High Performance Computing Vol. 4 No. 2 (2022): Article Research Volume 4 Number 2, July 2022
Publisher : Information Technology and Science (ITScience)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/cnahpc.v4i2.1458

Abstract

IndiHome (Indonesia Digital Home) is a leading digital fibre optic service product consisting of fibre optic internet services, landline telephones, and interactive TV services. Although the coverage of Indihome products is extensive in the city of Medan, in marketing, Indihome products have not reached the planned target. Based on data from Indihome service package users that have been received, Indihome product users only numbered 6419 customers in all STOs in Medan City. At the same time, the target was planned by PT. Telkom Access Medan, namely Marketing Indihome products, must reach 5,000 customers per month in all STOs in Medan City. Indihome product marketing is an obstacle for PT. Telkom Access Medan, because the Indihome product is a new product, the people of Medan City do not fully know what Indihome is and what facilities they get from using the Indihome service package. Therefore PT. Telkom Access Medan needs to make a plan to make a marketing strategy. The first step that needs to be done is to segment the market for the Indihome service package. This study aimed to determine the application of Data Mining using the K-Medoids Clustering method in the Indihome service package market segmentation at PT. Telkom Access Medan. With this research, it is hoped that it can provide a reference for the results of the decision so that it can help related parties to make it easier to classify the market segmentation of the Indihome service package at PT. Telkom Access Medan. Because the value of S > 0, then the calculation is stopped and ends in the 3rd iteration. Indihome service package data processing uses the k-medoids clustering method in the form of potential, potential, and not potential STO (Sentral Telephone Automated) cluster members.
Selection of Feature Driven Development (FDD) Model in Agile Method for Developing Information System of Mosque Management Sasmitoh Rahmad Riady; Khalis Sofi; Jafar Shadiq; Rita Wahyuni Arifin
Journal of Computer Networks, Architecture and High Performance Computing Vol. 4 No. 2 (2022): Article Research Volume 4 Number 2, July 2022
Publisher : Information Technology and Science (ITScience)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/cnahpc.v4i2.1469

Abstract

This paper discusses about software development for building a project using the Feature Driven Development (FDD) model contained in the agile method. As in other agile methods, the Feature Driven Development model has additional properties to implement functions and needs in a short iteration. In terms of the characteristics contained in several other agile models almost all of them have similarities so that makes the stakeholder confusion in determining which model will be chosen as a method of software development. This study focuses on the search for a number of suitable project specifications in the selection of Feature Driven Development models for software development. From the research that has been done on several papers there are several aspects of design and construction in software development by emphasizing the quality and high level of features in developing a software using the Feature Driven Development model. In facilitating the results of the Feature Driven Development model, we will provide a case study of Mosque Management Information System which has several features, such as content management, information of prayer time, online reading Qur’an, and Petty Cash Mosque management. This case is implemented by Feature Driven Development model with short iteration, because this project had done in several months
Android Based Spark and Gas Leak Detection and Monitoring Dwiny Meidelfi; Hanriyawan Adnan Moodutor; Fanni Sukma; Sandri Adnin
Journal of Computer Networks, Architecture and High Performance Computing Vol. 4 No. 2 (2022): Article Research Volume 4 Number 2, July 2022
Publisher : Information Technology and Science (ITScience)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/cnahpc.v4i2.1489

Abstract

LPG cylinder leakage is one of the causes of fires in the community. To prevent fires, a fire and gas leak detection and monitoring device were made using a fire detector sensor and an Android-based MQ-6 to trigger it. Data collection techniques in the manufacture of gas and fire leak detection using a flame detector and the MQ-6 sensor can be obtained from datasheets, journals, books and articles, and several internet sites that support the manufacture of this device. In the manufacture of gas leak detection devices or tools, there are also two parts, namely the first to make hardware (hardware), then software (software). The result of this tool detection is that users can find out the level of LPG due to leaking of LPG cylinders and detect fire using Android notifications in real-time and the data is displayed in detail on the browser page. The conclusion of this study is that users are safer because there is a gas leak, the tool will detect LPG gas, then a message will be displayed on the LCD screen and a notification on Android and the buzzer will automatically turn on. If there is a fire from detecting the gas leak, the fire detector will detect the fire, which will result in a notification sent to Android that there is a fire and the buzzer will turn on