cover
Contact Name
Nurul Khairina
Contact Email
nurulkhairina27@gmail.com
Phone
+6282167350925
Journal Mail Official
nurul@itscience.org
Editorial Address
Jl. Setia Luhur Lk V No 18 A Medan Helvetia Tel / fax : +62 822-5158-3783 / +62 822-5158-3783
Location
Kota medan,
Sumatera utara
INDONESIA
Journal of Computer Networks, Architecture and High Performance Computing
ISSN : 26559102     EISSN : 26559102     DOI : 10.47709
Core Subject : Science, Education,
Journal of Computer Networks, Architecture and Performance Computing is a scientific journal that contains all the results of research by lecturers, researchers, especially in the fields of computer networks, computer architecture, computing. this journal is published by Information Technology and Science (ITScience) Research Institute, which is a joint research and lecturer organization and issued 2 (two) times a year in January and July. E-ISSN LIPI : 2655-9102 Aims and Scopes: Indonesia Cyber Defense Framework Next-Generation Networking Wireless Sensor Network Odor Source Localization, Swarm Robot Traffic Signal Control System Autonomous Telecommunication Networks Smart Cardio Device Smart Ultrasonography for Telehealth Monitoring System Swarm Quadcopter based on Semantic Ontology for Forest Surveillance Smart Home System based on Context Awareness Grid/High-Performance Computing to Support drug design processes involving Indonesian medical plants Cloud Computing for Distance Learning Internet of Thing (IoT) Cluster, Grid, peer-to-peer, GPU, multi/many-core, and cloud computing Quantum computing technologies and applications Large-scale workflow and virtualization technologies Blockchain Cybersecurity and cryptography Machine learning, deep learning, and artificial intelligence Autonomic computing; data management/distributed data systems Energy-efficient computing infrastructure Big data infrastructure, storage and computation management Advanced next-generation networking technologies Parallel and distributed computing, language, and algorithms Programming environments and tools, scheduling and load balancing Operation system support, I/O, memory issues Problem-solving, performance modeling/evaluation
Articles 795 Documents
Analysis of the Multi Objective Optimization by Ratio Analysis (MOORA) Method in Determining Pilot Areas at PT. XYZ Simamora, Windi Saputri; Harahap, Siti Sarah; Idaman, Akbar; Simatupang, Septian
Journal of Computer Networks, Architecture and High Performance Computing Vol. 6 No. 3 (2024): Articles Research Volume 6 Issue 3, July 2024
Publisher : Information Technology and Science (ITScience)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/cnahpc.v6i3.4149

Abstract

This research analyzes the application of the Multi Objective Optimization by Ratio Analysis (MOORA) method model in determining the Pilot Area at PT XYZ. This method is used to evaluate various performance criteria, including customer satisfaction, productivity, service quality, and operational efficiency. Currently, the Pilot Area assessment and selection process at PT XYZ is still done manually, which causes a lack of accuracy and efficiency. MOORA was chosen for its ability to handle multi-criteria decision-making problems more systematically and objectively. The analysis results showed that Alternative Area 7 obtained the highest final score of 0.39, placing it as an area with superior performance. The application of MOORA is proven to improve accuracy and efficiency in the Pilot Area determination process, providing a more objective basis for decision-making. By using MOORA, PT XYZ can evaluate area performance more comprehensively and accountably. This research recommends that PT XYZ implement the MOORA method thoroughly and conduct periodic evaluations of the methods used. For theory development, PT XYZ can add specific evaluation criteria according to company needs. The implementation of these suggestions is expected to improve the quality of service and competitiveness of PT XYZ in the global market. Further research is expected to compare MOORA with other methods to strengthen the validity of the results. Thus, this research not only provides a practical contribution to PT XYZ but also adds academic insight into the application of multi-criteria optimization methods in the context of performance management and service improvement.
Design And Build A Mobile-Based Calligraphy And Inscription Order Customize Application With The Waterfall Method Using Fabric JS Maulana, Alfarizi; Alda, Muhamad
Journal of Computer Networks, Architecture and High Performance Computing Vol. 6 No. 3 (2024): Articles Research Volume 6 Issue 3, July 2024
Publisher : Information Technology and Science (ITScience)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/cnahpc.v6i3.4157

Abstract

Mobile-based apps have become one of the most important aspects of daily life and even for spiritual and aesthetic purposes such as ordering calligraphy and inscriptions. This also had an impact on the Inscription Blessing Shop. In recent years, the demand for personalized calligraphy and inscriptions has increased significantly.  However, this store experienced problems in the ordering process. The process of ordering calligraphy and inscriptions is often still done conventionally, where consumers have to come to the store to place an order which may take a long time and is inefficient. To overcome these obstacles, an effective and efficient system is needed by designing and building a mobile-based booking application. This application will be designed using the waterfall development method by utilizing Fabric JS technology as an interface design. The results of this study were obtained that a mobile-based application called the Blessing Inscription Application was formed which can order inscriptions and other carvings anywhere and anytime. The app can allow users to select different types of calligraphy fonts, set layouts, and add decorative elements. This research is expected to make a significant contribution in facilitating users' creativity and enriching their experience in designing and sharing calligraphy works and digital inscriptions.
Analysis of User Journey Mapping Factors to Enhance User Experience in the Tokopedia Mobile E-Commerce Application Darma Paramartha, I Gusti Ngurah; Sofyan, Yohanes Samuel; Permana, Gusi Putu Lestara
Journal of Computer Networks, Architecture and High Performance Computing Vol. 6 No. 3 (2024): Articles Research Volume 6 Issue 3, July 2024
Publisher : Information Technology and Science (ITScience)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/cnahpc.v6i3.4162

Abstract

Recent technological advancements have significantly transformed human life, particularly with the advent of the Fourth Industrial Revolution, which has profoundly influenced the use of the internet for business and economic activities. E-commerce has emerged as a crucial medium for online buying and selling, propelled by these digital advancements. This growth is especially evident in Indonesia, which ranks among the countries with the highest number of internet users globally. This study aims to identify the dominant factors influencing user journey mapping and their impact on the user experience of Tokopedia mobile application users. The research sample comprises 125 users of the Tokopedia application, with data collected through questionnaires distributed via Google Forms. The analysis involves factor analysis and simple linear regression. The findings reveal that the dominant factors influencing user journey mapping are user persona and opportunity. Furthermore, the study demonstrates that user journey mapping positively impacts the user experience for Tokopedia application users. This research underscores the importance of understanding user journey mapping in enhancing the overall user experience, which is crucial for e-commerce platforms like Tokopedia. The insights gained from this study can assist developers and marketers in better tailoring their strategies to improve user engagement and satisfaction. This study provides valuable perspectives on how user journey mapping can be utilized as a strategic tool to optimize user interactions and ensure that each step in the user journey delivers maximum value. Thus, user journey mapping not only enhances individual experiences but also contributes to the overall success of e-commerce platforms in an increasingly competitive market.
The Use of K-Means Algorithm Clustering in Grouping Life Expectancy (Case Study: Provinces in Indonesia) Nugraha, Dimas Reza; Zy, Ahmad Turmudi; Sunge, Aswan Supriyadi
Journal of Computer Networks, Architecture and High Performance Computing Vol. 6 No. 3 (2024): Articles Research Volume 6 Issue 3, July 2024
Publisher : Information Technology and Science (ITScience)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/cnahpc.v6i3.4171

Abstract

Life expectancy is defined as information that illustrates the age of the death of a population. Life expectancy is a general picture of the state of a region. If the infant mortality rate is high, then the life expectancy in the area is low. And vice versa, if the infant mortality rate is low, the life expectancy in the region is high. Life expectancy is also a benchmark for government actions in improving the welfare of society and the human development index. For this reason, it is necessary to group life expectancy data to make it easier to determine the provinces with high, middle, and low life expectancy. The results of cluster testing using the silhouette score method showed that two subjects had a low silhouette score level, which caused the cluster value to be less than optimal, namely East Java  & Gorontalo. The clustering results found that the cluster was divided into 3, namely cluster 1, with a high level of life expectancy consisting of 10 provinces, namely East Java, Riau, North Sulawesi, Bali, North Kalimantan, DKI Jakarta, West Java, Central Java, East Kalimantan and Special Region of Yogyakarta. Cluster 2 has a level of middle-life expectancy consisting of 18 provinces, namely Gorontalo, North Maluku, Central Sulawesi, South Kalimantan, North Sumatra, Bengkulu, West Sumatra, Central Kalimantan, Aceh, South Sumatra, Banten, Kep. Riau, South Sulawesi, Kep. Bangka Belitung, Lampung, West Kalimantan, Southeast Sulawesi and Jambi. Cluster 3, with a low level of life expectancy, consists of 6 provinces, namely West Sulawesi, Papua, Maluku, West Papua, West Nusa Tenggara, and East Nusa Tenggara.
Web-Based Archiving Information System At The Ministry of Public Works and Housing Province of Jambi Maulana, Ade Novia; Pelisa, Egidia Ratu; Afriadi, Hery
Journal of Computer Networks, Architecture and High Performance Computing Vol. 6 No. 3 (2024): Articles Research Volume 6 Issue 3, July 2024
Publisher : Information Technology and Science (ITScience)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/cnahpc.v6i3.4191

Abstract

This research was conducted at the Jambi Province Public Works and Public Housing Office (PUPR). This research is entitled "Design of a Website-Based Archiving Information System at the Jambi Province Public Works and Public Housing Office (PUPR)". The purpose of this research is to document the process of designing an information system that functions to provide information to the PUPR Office of Jambi Province. This research was conducted qualitatively by conducting interviews and observations with the PUPR Office of Jambi Province to complete the research. The document filing system of the Jambi Province PUPR Office was designed using the prototype method. As a result of the analysis and observations made, it can be concluded that one effective way to facilitate the work of employees in finding documents is to build a web-based archiving information system. This system is expected to produce information quickly, precisely, and accurately without reducing the value of the information itself.
Sentiment Analysis of Public Comments on Coldplay Concerts on Twitter Using the Naïve Bayes Method Dwisyahputra, Achmad Adbillah; Kurniawan, Rakhmat
Journal of Computer Networks, Architecture and High Performance Computing Vol. 6 No. 3 (2024): Articles Research Volume 6 Issue 3, July 2024
Publisher : Information Technology and Science (ITScience)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/cnahpc.v6i3.4202

Abstract

Social media platform Twitter had become one of the most popular platforms for communication and information sharing. In the context of entertainment events such as music concerts, Twitter became a bustling place with various comments and opinions from the public regarding their experiences attending a concert. Many fans shared their experiences about Coldplay concerts on Twitter. These comments were highly varied and required a thorough understanding to interpret the overall public sentiment. Event organizers and Coldplay's band managers needed to understand public feelings about their concerts. This information was crucial for the evaluation and improvement of future events. Comments on Twitter were often brief and diverse, making manual data processing inefficient and necessitating automated tools to understand the sentiment within them. Sentiment analysis, or opinion mining, was the process used to understand, extract, and process text data automatically to gather information about the sentiment contained in opinion sentences. Research on sentiment analysis frequently focused on opinions that contained positive or negative sentiments. To classify these positive and negative sentiments, the Naive Bayes (NB) classification method was employed. The purpose of this study was to analyze the sentiment of public comments about Coldplay concerts on Twitter using the Naive Bayes method. The expected outcome was to provide insights into public sentiment towards Coldplay concerts, which would be valuable for event organizers and the band's managers in evaluating and improving future events.
Implementation of Dart Programming Language in Mobile-Based DRs Snack Sales Application Design Vindua, Raditia; Handayani, Dede; Ekrinifda, Ardilla
Journal of Computer Networks, Architecture and High Performance Computing Vol. 6 No. 3 (2024): Articles Research Volume 6 Issue 3, July 2024
Publisher : Information Technology and Science (ITScience)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/cnahpc.v6i3.4203

Abstract

DRs Snack has been making and selling snacks in the vicinity. However, they face problems in manually recording sales and generating accurate reports. Therefore, this project aims to design and implement a mobile-based sales system application that will help DRs Snack in managing sales and recording reports more efficiently. The main objective of this project is to design and develop a mobile-based sales system application with Dart programming language and Flutter framework that can help dRs Snack in recording sales transactions in real-time, generate sales and financial reports quickly and accurately, improve operational efficiency and decision making. The method used for system development is Extreme Programing, where this method has a development target through the determination of unclear needs or changes to the needs very quickly and through a small to medium-sized team. The results of this study can manage menus and orders that have been proven to increase operational efficiency. The implementation of this system is able to reduce the time required for order processing and improve the accuracy of data related to stock and revenue. With an integrated system, customer service can be improved and reduce human error in summarizing total payments and ensure accuracy in payments. The system enables better data analysis, especially in monitoring order history and sales recap to improve sales reports. Suggestions from researchers to maximize the features of existing features and add features to complement the features that are already running.
User-Centered Design Approach in Developing User Interface and User Experience of Sculptify Mobile Application Dananjaya, Md. Wira Putra; Prathama, Gede Humaswara; Darmaastawan, Kadek
Journal of Computer Networks, Architecture and High Performance Computing Vol. 6 No. 3 (2024): Articles Research Volume 6 Issue 3, July 2024
Publisher : Information Technology and Science (ITScience)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/cnahpc.v6i3.4206

Abstract

In the increasingly digital era, user interface (UI) and user experience (UX) design have become crucial factors in application development. The success of an application is not only determined by its functionality, but also by how well users can interact with the application. User Centered Design (UCD) is an approach that places users as the main focus in every stage of design, from initial research to final evaluation, to ensure that the resulting product truly meets user needs and expectations. This study applies the UCD approach to the UI and UX design of the Sculptify application, which is designed to facilitate the buying and selling of sculptures and other three-dimensional works of art. Given the complexity and uniqueness of art product transactions, effective UI and UX design is very important. This study involves the active participation of potential users through methods such as interviews, surveys, and usability testing to create an intuitive interface and provide a satisfying experience for users. The research stage begins with research to understand user needs and preferences, followed by initial design and a series of tests and iterations based on user feedback. The final evaluation is carried out to measure the extent to which the final design meets user needs and expectations. The results of the UCD implementation are expected to provide valuable insights into the importance of placing users at the center of the design process and how this can improve the quality of interactions and overall user satisfaction.
Industry Class Clustering of Software Expertise Competency at SMKN 2 Kraksaan Using Constrained K-Means Clustering Algorithm Khairi, Matlubul; Syafiih, M.; Khairi, Ahmad
Journal of Computer Networks, Architecture and High Performance Computing Vol. 6 No. 3 (2024): Articles Research Volume 6 Issue 3, July 2024
Publisher : Information Technology and Science (ITScience)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/cnahpc.v6i3.4214

Abstract

Addressing the gap between school education and industry needs is a recurring concern, as many graduates struggle to enter the workforce due to lacking practical skills. Industry Classes aim to bridge this gap by preparing students with relevant skills and knowledge aligned with real-world industry demands. This study focuses on the application of Constrained K-Means Clustering to categorize students in the software engineering competency classes at SMKN 2 Kraksaan. This algorithm modifies traditional K-Means by utilizing Linear Programming Algorithm (LPA), ensuring each cluster meets predefined subject requirements. The research involves analyzing academic proficiency test data (TKDA) from 96 X-grade students, evaluating their abilities in analogy, series, figural, mathematical, and recall skills. Using a 3-cluster approach, each with 32 to 60 student capacity constraints, the study aims to optimize student distribution for effective learning outcomes. Evaluation through silhouette method yielded a score of 0.3199, indicating satisfactory separation between clusters with overlap to address. Cluster analysis revealed Cluster 2 as the most proficient, showcasing strengths in recall and series attributes critical for software engineering. These findings suggest that Constrained K-Means Clustering is effective in classifying students, highlighting Cluster 2 as optimal for software engineering competencies at SMKN 2 Kraksaan. Future research should focus on enhancing data quality, expanding sample size, and refining algorithms for improved clustering accuracy and effectiveness.
Disguising Text Using Caesar Cipher, Reverse Cipher and Least Significant Bit (LSB) Algorithms in Video Siregar, Manutur; Jinan, Abwabul; Muhammad Raja Gunung, Tar
Journal of Computer Networks, Architecture and High Performance Computing Vol. 6 No. 3 (2024): Articles Research Volume 6 Issue 3, July 2024
Publisher : Information Technology and Science (ITScience)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/cnahpc.v6i3.4217

Abstract

In communication, there is a process of transferring information from the sender to the recipient. The information sent must be the same as the information received. If there are differences, it means that there has been a data change process carried out by irresponsible parties. One technique for changing the content of information is man in the middle. The data changer will receive information from the sender, then change it and forward it to the recipient, so that the changed information appears to have come from the sender.To protect information, this can be done by utilizing the science of cryptography and steganography which aims to protect information by changing it to another form or by inserting the information into other media. In this research, to protect information the Caesar Cipher Algorithm is used, this algorithm will change the letters in plaintext to another letter (ciphertext) by using an alphabetical shift according to the number in the form of the key used, namely > 1 and < 26, then the Reverse Cipher algorithm is carried out, namely changing the position of the letters of the plaintext from the first order to the last order and so on. The encrypted information will then be inserted into a video using the Steganography Algorithm, namely Least Significant Bit (LSB). Before being inserted, the video will first be converted into several image frames, then in one frame the information will be inserted. This can be done because the frame is a collection of RGB arrays which have values 0-255 or 0 and 1. So the insertion is done in bit form. Frames containing information will then be converted back into a video.On the receiving side, the video will be converted into a frame, next is the process of retrieving the information that was previously inserted. The information that has been taken is then reversed in order and then shifted using the Caesar chipper algorithm according to the key used by the sender, then the first letter of each word is changed to capital, so that the information sent is the same as that received. The implication of this research is that it is a way to combine cryptography with steganography as an information security technique.