cover
Contact Name
Nurul Khairina
Contact Email
nurulkhairina27@gmail.com
Phone
+6282167350925
Journal Mail Official
nurul@itscience.org
Editorial Address
Jl. Setia Luhur Lk V No 18 A Medan Helvetia Tel / fax : +62 822-5158-3783 / +62 822-5158-3783
Location
Kota medan,
Sumatera utara
INDONESIA
Journal of Computer Networks, Architecture and High Performance Computing
ISSN : 26559102     EISSN : 26559102     DOI : 10.47709
Core Subject : Science, Education,
Journal of Computer Networks, Architecture and Performance Computing is a scientific journal that contains all the results of research by lecturers, researchers, especially in the fields of computer networks, computer architecture, computing. this journal is published by Information Technology and Science (ITScience) Research Institute, which is a joint research and lecturer organization and issued 2 (two) times a year in January and July. E-ISSN LIPI : 2655-9102 Aims and Scopes: Indonesia Cyber Defense Framework Next-Generation Networking Wireless Sensor Network Odor Source Localization, Swarm Robot Traffic Signal Control System Autonomous Telecommunication Networks Smart Cardio Device Smart Ultrasonography for Telehealth Monitoring System Swarm Quadcopter based on Semantic Ontology for Forest Surveillance Smart Home System based on Context Awareness Grid/High-Performance Computing to Support drug design processes involving Indonesian medical plants Cloud Computing for Distance Learning Internet of Thing (IoT) Cluster, Grid, peer-to-peer, GPU, multi/many-core, and cloud computing Quantum computing technologies and applications Large-scale workflow and virtualization technologies Blockchain Cybersecurity and cryptography Machine learning, deep learning, and artificial intelligence Autonomic computing; data management/distributed data systems Energy-efficient computing infrastructure Big data infrastructure, storage and computation management Advanced next-generation networking technologies Parallel and distributed computing, language, and algorithms Programming environments and tools, scheduling and load balancing Operation system support, I/O, memory issues Problem-solving, performance modeling/evaluation
Articles 795 Documents
Research on Image Encryption Algorithm Based on Matrix Scrambling and Matrix Product Transformation Qin, Shu; Xu, Chunming
Journal of Computer Networks, Architecture and High Performance Computing Vol. 7 No. 2 (2025): Research Article, Volume 7 Issue 2 April, 2025
Publisher : Information Technology and Science (ITScience)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/cnahpc.v7i2.5643

Abstract

This study introduces an innovative image encryption algorithm that leverages multiple rounds of matrix scrambling and matrix product transformation. Each round of encryption integrates cross-scrambling operations within the image matrix and invertible matrix product transformations, thereby effectively disrupting pixel positions and values. By iteratively adjusting pixel positions and transforming pixel values, the algorithm significantly enhances the security and robustness of the encryption process. The experimental results demonstrate that the proposed algorithm exhibits excellent resistance to statistical analysis, differential attacks, and other potential threats, thereby ensuring high security and practical applicability.
Cracking Overtime: Unleashing Machine Learning at PT XYZ with Linear Regression, Neural Networks, and Random Forests Christia, Tifani Dewi; Yuadi, Imam
Journal of Computer Networks, Architecture and High Performance Computing Vol. 7 No. 2 (2025): Research Article, Volume 7 Issue 2 April, 2025
Publisher : Information Technology and Science (ITScience)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/cnahpc.v7i2.5678

Abstract

Excessive overtime at PT XYZ is a significant issue for the organization. Besides the significant financial repercussions, they may also affect employee health and productivity. This research aims to forecast future overtime hours, facilitating strategic planning, mitigating excessive overtime, and developing more effective overtime policies. This study employs an overtime realization dataset encompassing many characteristics that influence overtime determinations. The dataset is partitioned into training and testing data to serve as inputs for the three predictive algorithm models: linear regression, artificial neural network, and random forest. The random forest model demonstrates superior performance, evidenced by a mean squared error (MSE) of 158.78, which is proximate to the actual value. The root mean squared error (RMSE) of 12.601 is lower than that of the other two models, indicating a reduced average prediction error. The mean absolute error (MAE) of 8.931 reflects the average deviation from the actual value, while the mean absolute percentage error (MAPE) of 0.336 indicates a prediction error of 34%. Furthermore, the coefficient of determination (R²) of 0.914 signifies that approximately 91.4% of the variation in overtime hours is accounted for, in contrast to the other models, which accounted for 78.8% and 79.6%, respectively. The results indicate that the random forest model demonstrates superior predictive accuracy compared to the other two algorithms, owing to its capacity to handle non-linear data and outliers. Consequently, the random forest model is advocated as the most efficacious method for forecasting the amount of supplementary working hours in the future.
Development of Disaster Management Information System Application with Five Integrated Features Samhuri, Refita Yunie; Yonvitner, Yonvitner; Arkeman, Yandra
Journal of Computer Networks, Architecture and High Performance Computing Vol. 7 No. 2 (2025): Research Article, Volume 7 Issue 2 April, 2025
Publisher : Information Technology and Science (ITScience)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/cnahpc.v7i2.5731

Abstract

Indonesia, as one of the world’s largest archipelagic countries, is highly prone to natural disasters due to its geological, geographical, and socio-demographic conditions. Despite various efforts from the government and related institutions, there remains a lack of an integrated technological solution that addresses the critical aspects of disaster management. This research aims to develop a mobile-based disaster management information system called Aksi Bencana Indonesia, featuring five integrated functions: real-time disaster information, donation facilitation, volunteer management, logistics coordination, and disaster education. The development process involved identifying functional and non-functional requirements through interviews with disaster mitigation experts and literature studies, followed by UI/UX design using Figma, and coding using Flutter for the frontend and Laravel for the backend. User Acceptance Testing (UAT) was conducted with participants aged 18–55 to evaluate the system’s usability and effectiveness. The results showed that the application met the users’ expectations in providing timely and reliable information, facilitating donations and volunteer coordination, and supporting educational initiatives. Moreover, the integration of real-time features improved response time and enhanced the efficiency of resource distribution during disaster events. This study concludes that the application successfully bridges the gap between communities, donors, and volunteers, offering a practical solution for disaster preparedness and response. Future research may focus on expanding the system’s interoperability with national disaster databases and enhancing the analytics dashboard for better decision-making.
MITIGATION OF MULTI TARGET DENIAL OF SERVICE (DOS) ATTACKS USING WAZUH ACTIVE RESPONSE Paramaputra, Arya Pandya; Suranegara, Galura Muhammad; Setyowati, Endah
Journal of Computer Networks, Architecture and High Performance Computing Vol. 7 No. 2 (2025): Research Article, Volume 7 Issue 2 April, 2025
Publisher : Information Technology and Science (ITScience)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/cnahpc.v7i2.5755

Abstract

The increasing frequency of cyberattacks, particularly Denial of Service (DoS) attacks, poses significant challenges to the availability of online services. Multi-target DoS attacks exacerbate this issue by simultaneously targeting multiple systems, requiring robust and automated mitigation strategies. This study evaluates the effectiveness of Wazuh Active Response, an open-source Security Information and Event Management (SIEM) solution, in mitigating multi-target DoS attacks using the Slowloris technique. The methodology involved simulating multi-target DoS attacks using `slowhttptest` against multiple target servers and configuring Wazuh Active Response to automatically block malicious IP addresses upon detection. Key metrics measured included Success Rate, Response Time Detection, and Response Time Blocking. The results showed a Success Rate of 100% with Active Response enabled, an average Response Time Detection of 10.36 seconds, and an average Response Time Blocking of 50.36 seconds. This study confirms that Wazuh Active Response effectively mitigates multi-target DoS attacks, ensuring a high success rate in blocking malicious IP addresses and demonstrating the potential of automated threat detection and response mechanisms in enhancing network security against complex attack scenarios.
Analysis and Comparison of Methods Evaluation Process Multifactor Simple Additive Weighting Method In Tilawatil Musabaqah Quran (MTQ) North Sumatra Province Heriyanto, Heriyanto; Manahan, Olven
Journal of Computer Networks, Architecture and High Performance Computing Vol. 2 No. 1 (2020): Computer Networks, Architecture and High Performance Computing
Publisher : Information Technology and Science (ITScience)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/cnapc.v2i1.352

Abstract

 The purpose of holding an MTQ is Essentially to broadcast the Koran while looking for the bestto represent the MTQ at the next level. But the point is the greatness of newspapers. With that symbol, itIS ALSO DEMANDED that a person is not only good at reading and writing, but far more important isunderstanding the content of the newspaper itself. The goal is not only for of participants (who take partin the competition) but Also (and this is more important) for the listener. Decision Support System (DSS)is used as an alternative to application in the selection of MusabaqahTilawatil Quran (MTQ) in NorthSumatraProvince by using the multifactor Evaluation Process Method and the Simple AdditiveWeighting Method. In the MFEP and SAW methods decision making is done by giving Subjective andobjective considerations Considered to factors that are important. Reviews These considerations are in the form of weighting the multifactor Involved and are Considered important. With this Analysis and Comparison, it is expected to be Able to find a more suitable method and Be Able to help as a jury assistant to take a decision on the contestants and can help solve the problems in the MusabaqahTilawatil Quran (MTQ) Selection in North Sumatra Province properly.
Point of Sale Framework-Based Code Igniter and Model View Controller Using Lighthouse Testing Syaifudin, Muhammad; Fauziah, Fauziah; Rahman, Ben
Journal of Computer Networks, Architecture and High Performance Computing Vol. 3 No. 2 (2021): Journal of Computer Networks, Architecture and High Performance Computing, July
Publisher : Information Technology and Science (ITScience)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/cnahpc.v3i2.1006

Abstract

The success of companies engaged in the field of distributors is not only from good and smart human resources, but how ready the company's way to provide tools or programs supporting the work of employees. Some of the problems are the administration system between the company's internal divisions, so there are restrictions on the processing of input data, processes, outputs that are still manual. Web Application is made to facilitate employees to conduct administrative activities with the access role of each user admin division, for example inventory data, creation of sales invoices, road letters, procurement forms and bookkeeping. In addition, The Web View application is already responsive in this sense can adjust the device PC / Tablet / Mobile, then for visualization of data calculation already using cart / data graphics in real time, and there is also a feature preview, download and print JPEG, PNG, PDF, Barcode and QR code. Web Testing This application with black box method and shows it is running well and no error method, so it can be declared passed. Web Creation This application involves the LTE 2.0 Admin Template with bootstrap CSS, for programmer frameworks using MVC model view controllers that exist in the Code Igniter 3.0 framework so that it is faster and easier to implement or developed in other field companies or in the manufacturing industry. Tests using lighthouse for perform by 94% showed that the application designed to have a good performance for display results, and its access value of 60%, indicating that the process related to responsiveness between users is appropriate both using PC / Tablet / Mobile
Facial Recognition on System Prototype to Verify Users using Eigenface, Viola-Jones and Haar Robin, Robin; Handinata, Aldrick; Chandra, Wenripin
Journal of Computer Networks, Architecture and High Performance Computing Vol. 3 No. 2 (2021): Journal of Computer Networks, Architecture and High Performance Computing, July
Publisher : Information Technology and Science (ITScience)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/cnahpc.v3i2.1058

Abstract

Facial recognition is one of the most popular way to authenticate user into a system. This method is preferable considering the tendency of users for using the same password across multiple sites which made the user has already made his own account securities in vulnerable states. Using biometrics might supply solutions to solve this problem and facial recognition is one of the best biometric methods can be apply as a digital account security solution. This study to design a prototype system implementing facial recognition to verify users to measure how accurate these methods are. The method used here is Viola-Jones for face detection, Eigenface and Haar feature for face recognition from the OpenCV. The system was designed in Java. Based on the test results from the system designed, system can recognize user face with 100% accuracy if faces are shot in a well desirable condition. The system is able to recognize the user's face with various expressions including with or without glasses. However, the system has difficulty in recognizing user’s face in facing up, down, sideways position or blocked by accessories or body parts such as hands. After some experiment, it was proven that the system designed is accurate, reliable and safe enough to be implemented to digital authorization process.
Design And Build The AMANAH Vocational School Main Book Application Using The Waterfall Model Farabi, Nur Ali; Asymar, Hasta Herlan; Rachmat Hidayat; Setiawan, Dimas Muslim
Journal of Computer Networks, Architecture and High Performance Computing Vol. 4 No. 1 (2022): Article Research Volume 4 Number 1, Januay 2022
Publisher : Information Technology and Science (ITScience)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/cnahpc.v4i1.1166

Abstract

The benefits of information technology in the field of education include improving educational services, facilitating the collection and dissemination of educational information, educational data storage media, improving teaching skills, motivating students, thus helping communication activities in education. The concept of this information system has the effect of transforming the filling of the conventional ledger into digital form, by carrying out this transformation it can affect the easier filling of the master book and secure data storage and a longer time. After the process of accepting new students at SMK AMANAH is completed, the administrative officer or administrative administration enters student data, the value of student report cards per semester into the student master book, the difficulties encountered by administrative officers during the process of entering the data, officers have difficulty in terms of The main book used has a large size and the storage of the master book is still less effective and does not last long because it can be damaged, even though the master book should be able to be used for a long time as a document that is needed at any time. The research method used to design a student master book system is to use the waterfall or waterfall method to produce a design for the school's main book information system (SIBIS). Starting from the login page, the new student registration page, the grade submission page, and reports to help the school.
Tsukamoto Fuzzy Method Analysis in Laptop Damage Diagnosis (Retracted) Laia, Yonata; Halim, Agusman
Journal of Computer Networks, Architecture and High Performance Computing Vol. 4 No. 1 (2022): Article Research Volume 4 Number 1, Januay 2022
Publisher : Information Technology and Science (ITScience)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/cnahpc.v4i1.1235

Abstract

The author's request letter for manuscript withdrawal is in the PDF download section. Dec 5, 2023
Digital Image Copyright Protection with Spatial Domain Public Image Watermarking Scheme Harahap, Mawaddah; Malau, Johannes Rianto; Simangungsong, Tentus Natoka; Winata, Davin; Hadyanto, David
Journal of Computer Networks, Architecture and High Performance Computing Vol. 4 No. 1 (2022): Article Research Volume 4 Number 1, Januay 2022
Publisher : Information Technology and Science (ITScience)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/cnahpc.v4i1.1335

Abstract

The resulting digital image certainly has the copyright attached to the image. There needs to be protection of digital image works because the form of storage of digital imagery works that are vulnerable to piracy, claims of unauthorized authorities, illegal duplication, or unauthorized modification. The Spatial Domain Public Image Watermarking method is used to protect digital imagery using applications designed to facilitate the watermarking process on several different digital images as well as with different image formats. The reason for using this method is because it has low complexity. In this study, it consisted of three processes carried out, namely the process of making watermarking, the process of checking watermarking and comparison of input imagery and image results. In the process of making watermarking do image input as a watermarking media, input inserted imagery in the form of binary images / text, key inputs and watermark results. In process of checking watermarking performs image input that becomes watermark media, watermark results input, key input, and checking results. The process of creating watermarking takes a relatively short time while the process of extracting watermarking processing time depends on the size of the image file. From some image testing conducted using imagery with three formats, namely: JPG with an average time accuracy of 9:5,310(42.15%), .GIFs with an average time of 8:27.207(21.63%), and. BMP has an average time accuracy of 5:2.989(36.22%). Thus, the determination of the image format used is adjusted to the original image, so that it can perform time efficiency.