cover
Contact Name
Nurul Khairina
Contact Email
nurulkhairina27@gmail.com
Phone
+6282167350925
Journal Mail Official
nurul@itscience.org
Editorial Address
Jl. Setia Luhur Lk V No 18 A Medan Helvetia Tel / fax : +62 822-5158-3783 / +62 822-5158-3783
Location
Kota medan,
Sumatera utara
INDONESIA
Journal of Computer Networks, Architecture and High Performance Computing
ISSN : 26559102     EISSN : 26559102     DOI : 10.47709
Core Subject : Science, Education,
Journal of Computer Networks, Architecture and Performance Computing is a scientific journal that contains all the results of research by lecturers, researchers, especially in the fields of computer networks, computer architecture, computing. this journal is published by Information Technology and Science (ITScience) Research Institute, which is a joint research and lecturer organization and issued 2 (two) times a year in January and July. E-ISSN LIPI : 2655-9102 Aims and Scopes: Indonesia Cyber Defense Framework Next-Generation Networking Wireless Sensor Network Odor Source Localization, Swarm Robot Traffic Signal Control System Autonomous Telecommunication Networks Smart Cardio Device Smart Ultrasonography for Telehealth Monitoring System Swarm Quadcopter based on Semantic Ontology for Forest Surveillance Smart Home System based on Context Awareness Grid/High-Performance Computing to Support drug design processes involving Indonesian medical plants Cloud Computing for Distance Learning Internet of Thing (IoT) Cluster, Grid, peer-to-peer, GPU, multi/many-core, and cloud computing Quantum computing technologies and applications Large-scale workflow and virtualization technologies Blockchain Cybersecurity and cryptography Machine learning, deep learning, and artificial intelligence Autonomic computing; data management/distributed data systems Energy-efficient computing infrastructure Big data infrastructure, storage and computation management Advanced next-generation networking technologies Parallel and distributed computing, language, and algorithms Programming environments and tools, scheduling and load balancing Operation system support, I/O, memory issues Problem-solving, performance modeling/evaluation
Articles 795 Documents
Factors Affecting the Implementation of e-Surat Applications at Regional Apparatus Organizations in Tabanan Regency Juliantara, I Wayan Ady; Sariyasa; Sunarya, I Made Gede
Journal of Computer Networks, Architecture and High Performance Computing Vol. 5 No. 1 (2023): Article Research Volume 5 Issue 1, January 2023
Publisher : Information Technology and Science (ITScience)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/cnahpc.v5i1.2070

Abstract

The development of information technology has given birth to many new innovations, such as the e-Surat application which can help the administrative process of electronic service manuscripts at the OPD (Regional Apparatus Organization) in Tabanan Regency. The implementation of the e-Surat application on OPD in Tabanan Regency is still not optimal, there are factors that affect the implementation of the e-Surat application on OPD in Tabanan Regency. The model or method that is considered appropriate for analyzing and understanding the factors that can affect the implementation of the e-Surat application on OPD in Tabanan Regency is the TOE framework that will analyze the implementation of the e-Surat application on OPD in Tabanan Regency in terms of technology, organization and environment aspects. Data analysis techniques use multiple linear regression analysis. The results of the data analysis show that: (1) technological variables have a positive and significant effect on the implementation of e-Surat applications in OPD in Tabanan Regency, (2) organizational variables have a positive and significant effect on the implementation of e-Surat applications in OPD in Tabanan Regency and (3) environmental variables have a positive and significant effect on the implementation of e-Surat applications in OPD in Tabanan Regency.
Information Technology Governance Audit Using COBIT 5 Framework in the Natural Resources Conservation Office Putra, I Gede Eka Artha; Dewi, Luh Joni Erawati; Sunarya, I Made Gede
Journal of Computer Networks, Architecture and High Performance Computing Vol. 5 No. 1 (2023): Article Research Volume 5 Issue 1, January 2023
Publisher : Information Technology and Science (ITScience)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/cnahpc.v5i1.2079

Abstract

One of the organizations that requires the implementation of good information technology governance is the natural resources conservation office. The audit was conducted to determine the level of IT process capability based on the COBIT 5 standard and to determine the level of gaps (gaps) owned by the natural resources conservation office. The process of implementing the audit begins with observing the agency's environment related to activity data and its implementation, then mapping the data with business objectives according to COBIT 5, followed by mapping business objectives with IT objectives to obtain IT processes. The IT processes obtained are then selected to obtain important IT processes according to company officials. The TI process obtained is then processed using the Guttman method. The results of the IT process capability level, namely EDM01, EDM02 and APO09, are at level 3 (established). The gaps found need to be given a corrective strategy to achieve the capability expected by the institution, namely 4 (predictable process) by providing recommendations regarding steps to achieve the expected capability value. The recommendations and improvements provided use ISO/IEC 15504:2 and ISO27002 standards which were obtained by mapping IT processes on COBIT 5.
Determination of Exemplary Lecturer Decision Making with Modified Attributes and Criteria Prioritization Technique Usanto; Nurlaela, Lela; Syahrial, Reza
Journal of Computer Networks, Architecture and High Performance Computing Vol. 5 No. 1 (2023): Article Research Volume 5 Issue 1, January 2023
Publisher : Information Technology and Science (ITScience)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/cnahpc.v5i1.2143

Abstract

The problem of determining exemplary lecturers is included in the multi-criteria decision making problem because the assessment can be based on predetermined assessment criteria. Consequently, determining exemplary lecturers is an important aspect of improving the quality of education in an institution. In order for the final outcomes of exemplary lecturers to be objective and to examine various values for each criterion and criterion characteristic, decision-making processes are obviously required. Consequently, the goal of this study is to provide a model for evaluating the performance of exemplary lecturers by employing decision making with changed criterion characteristics and criteria prioritization strategies based on the Rank Order Centroid (ROC) method. At the end of the procedure, the best alternative will be chosen based on the choice assessment model for identifying excellent lecturers with a case study at institution XYZ. Analysis of the final results revealed that the decision assessment model was influenced by modifying the assessment attributes using a Likert scale. The final results revealed that one of three alternative candidates for exemplary lecturer was selected based on alternative values for each criterion.
My Bengkel Application to Facilitate Bookkeeping for Small and Medium Enterprises in the Automotive Sector Widayati, Qoriani; Effendy, Irman; Nurhayati, Siti; Putri, Msy. Mawaddah Utama
Journal of Computer Networks, Architecture and High Performance Computing Vol. 5 No. 1 (2023): Article Research Volume 5 Issue 1, January 2023
Publisher : Information Technology and Science (ITScience)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/cnahpc.v5i1.2150

Abstract

Small and Medium Enterprises (SMEs) are an important part of the economy of a country or region, as well as in Indonesia, these SMEs play a very important role in the speed of the people's economy. These SMEs are also very helpful to the state/government in terms of creating new jobs and through SMEs many new work units are created that use new workers who can support household income. Simple bookkeeping is a standard that must be owned by all SME business people. It is often found that small business actors or SME businesses have never recorded all of their business activities. They don't even use a simple bookkeeping example to help manage and regulate all financial traffic. From these problems, this research seeks to find the right solution where researchers plan to make a business bookkeeping application to make it easier for SMEs. One type of UKM that is the object of this research is the Automotive Workshop field. The workshop is one type of business that is needed by the community, because of that computerized bookkeeping is needed. By using the prototype software development method. The results of this research are in the form of the My Bengkel application which will later be equipped with several features ranging from Sales, Purchases, Expenses, Receipts, Inventory to Payables and Accounts Receivable
Analysis Of Product Price For Creative Economic Business Yogyakarta Special Region Using Data Scrapping Ayuningtyas, Astika; Indrianingsih, Yuliani; Mauidzhoh, Uyuunul
Journal of Computer Networks, Architecture and High Performance Computing Vol. 5 No. 1 (2023): Article Research Volume 5 Issue 1, January 2023
Publisher : Information Technology and Science (ITScience)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/cnahpc.v5i1.2184

Abstract

The government in the National Economic Recovery (PEN) launched a strategy to increase business activity, namely by maximizing the potential for product sales through E-Commerce. E-Commerce sites in Indonesia display product information with different descriptions and prices. Through the pages on E-Commerce can collect data to form a useful information. Collection of data variations requires a method or system that can automatically collect the data provided on the Web page. In addition to data collection, another thing that needs to be considered is the meaning of knowledge from the collection of information that has been obtained. For these data to be useful, it is necessary to design a place for data management. Data must be selected and arranged properly so that it is easy to use so that it gives a good meaning. This research requires methods and tools in the process. The method used is Web Scrapping while the tools used are Tableau. There are two objectives in this research. First, obtain product price data for creative economy entrepreneurs in the Special Region of Yogyakarta through E-Commerce, especially Tokopedia and Bukalapak. Second, present product price data visually to facilitate the process of price distribution analysis so that it can provide information to local governments, especially product managers from creative economy business actors to support strategic policies in determining product prices from creative economy business actors in the Special Region of Yogyakarta to support promotion and tourism.
Behavioral Intention and Adoption of Digital Bank Mobile Application Among Housewives Using Mixed Method Approach Saudjhana, Audrey; Herman
Journal of Computer Networks, Architecture and High Performance Computing Vol. 5 No. 1 (2023): Article Research Volume 5 Issue 1, January 2023
Publisher : Information Technology and Science (ITScience)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/cnahpc.v5i1.2185

Abstract

This mixed-method research using PLS-SEM and fsQCA analysis aims to identify the factors that influence the behavioral intention of Indonesian housewives to adopt digital banking applications, particularly by examining the UTAUT2 model's variables. The study found that facilitating conditions, price values, and habits are significant factors that affect the behavioral intention of housewives to use digital banks. Furthermore, the study suggests that paying attention to the factors of effort expectancy, social influence, facilitating conditions, and habits simultaneously is the most effective approach to generating behavioral intention factors in digital bank adoption. The findings have important implications for digital bank companies, the government, financial institutions, and fintech startups. Future research should strive to obtain a more even distribution of respondents from different regions in Indonesia to reduce bias and obtain results that truly represent the conditions of housewives in Indonesia as a whole.
Sentiment Analysis of Twitter Cases of Riots at Kanjuruhan Stadium Using the Naive Bayes Method Katiandhago, Bryan Jerremia; Mustolih, Akhmad; Susanto, Wachyu Dwi; Subarkah, Pungkas; Satrio Nugroho, Chendri Irawan
Journal of Computer Networks, Architecture and High Performance Computing Vol. 5 No. 1 (2023): Article Research Volume 5 Issue 1, January 2023
Publisher : Information Technology and Science (ITScience)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/cnahpc.v5i1.2196

Abstract

Sentiment analysis is a process carried out to analyze opinions, sentiments, judgments, and emotions from the riot case at the kanjuruhan stadium. The purpose of this research is to find out public opinion about the tragedy that is currently happening at the Kanjuruhan Stadium. the data was obtained from social media Twitter using the Twitter API, then after that, an analysis was carried out. data from the results of the analysis will be classified using the Naive Bayes method. The classification process is divided into 7 (seven) stages, namely Crawling, Cleansing, pre-processing, labeling, classification, data training, and data testing. In the labeling process, data is classified into 2 (two) classes, namely the positive class and the negative class. The data obtained before the preprocessing process was 1963 tweets, after the preprocessing the data obtained was 1001 tweets. The data will be trained and tested using the naive Bayes classification method. classification results obtained precision values of 82% for negative data and 65% for positive data, recall values obtained 74% for negative data and 75% for positive data, F1-score values obtained 78% for negative data and 70% for positive data, while accuracy value obtained 74%.
Artificial Intelligence (AI) of Financial in the VUCA Era: A Systematic Mapping Study Iryani, Iryani; Yulianto, Harry
Journal of Computer Networks, Architecture and High Performance Computing Vol. 5 No. 2 (2023): Article Research Volume 5 Issue 2, July 2023
Publisher : Information Technology and Science (ITScience)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/cnahpc.v5i2.2201

Abstract

The purpose of the study was to systematically map Artificial Intelligence (AI) in the financial sector in the VUCA era. The research design employed a quantitative approach with a descriptive method. The study utilized a systematic literature review with bibliometric analysis techniques. Researchers collected the data from the Google Scholar database, technique analysis using VOSviewer, and descriptive statistics as data analysis techniques. The results indicated the following: (RQ1) 539 articles met the criteria for research; (RQ2) Springer was the publisher with the highest number of AI in Financial articles (58 articles); (RQ3) Karina Kasztelnik authored the most papers on AI in financial (3 documents); (RQ4) an article written by David Mhlanga titled "Industry 4.0 in Finance: The Impact of Artificial Intelligence (AI) on Digital Financial Inclusion" had the most citations (145 citations); and (RQ5) the systematic mapping results identified 8 clusters as research gaps, suggesting potential themes for future studies related to AI in the financial domain. The findings indicate a research gap and highlight the potential for further research on AI in the financial sector in the VUCA era. The role of AI in the financial industry in the VUCA era was to enhance efficiency, speed, accuracy, and security. AI can assist in addressing rapidly emerging complex challenges, providing competitive advantages for FinTech companies to navigate dynamic changes and uncertain business environments.
The Design of Smart Prototype Pet Feeder Using Passive InfaRed (PIR) Sensors Marlina, Erni
Journal of Computer Networks, Architecture and High Performance Computing Vol. 5 No. 1 (2023): Article Research Volume 5 Issue 1, January 2023
Publisher : Information Technology and Science (ITScience)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/cnahpc.v5i1.2237

Abstract

Food is necessary to support daily life and in pets like cats. Pet feeders are usually carried out routinely by pet owners by taking the time to stay at home and feed the pets. With activities requiring animal owners to be outside the home for long periods, it is necessary to design a prototype that can automatically assist the process of providing food, especially dry food, to pets. So pet feeders can be carried out even though the owner is not at home and does not have spare time. The system was built using the C language related to the Code Vision tools that support the hex file compiler into the microcontroller. The research method used is the experimental method, namely conducting trials (trial and error) directly on the research object and the comparative testing method for testing the built system. The auto pet feeder prototype uses the ATMega8535 IC by utilizing a PIR (Passive InfraRed) sensor to detect movement around the animal bowl. The PIR sensor detects well as expected, and it has an effective detection range of up to 5 meters. Not only detects humans, but the PIR sensor can also detect other living things. The PIR sensor will send a signal to the microcontroller to open the valve from the food measuring station, which is driven by a DC motor based on the detected motion to drop food into the animal's bowl. PhotoDioda controls the amount of food falling into the animal's bowl. The test results of this tool show that at a distance of 0–6 meters, the PIR sensor can provide feedback or detect animal movements well.
Forensic Web Analysis on The Latest Version of Whatsapp Browser Utomo, Dicky Satrio Ikhsan; Prayudi , Yudi; Ramadhani, Erika
Journal of Computer Networks, Architecture and High Performance Computing Vol. 5 No. 1 (2023): Article Research Volume 5 Issue 1, January 2023
Publisher : Information Technology and Science (ITScience)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/cnahpc.v5i1.2286

Abstract

With the rapid growth of technology and the increasing number of smartphone users, social media applications have proliferated. Among them, WhatsApp has emerged as the most widely used application, with over a quarter of the world's population using it since 2009. To meet the increasing customer demands, WhatsApp has introduced a browser version, which has undergone continuous updates and improvements. The latest version of WhatsApp exhibits significant differences in features and settings compared to its predecessors, particularly in conversations, images, video recordings, and other aspects. Consequently, this research focuses on analyzing artifacts that can aid in forensic investigations. The study aims to extract artifacts related to conversation sessions, as well as media data such as audio files, contact numbers, photos, videos, and more. To achieve these objectives, various forensic tools will be employed to assist in the artifact search within the WhatsApp browser. The research adopts the NIST framework and utilizes forensic techniques like Autopsy and FTK Imager to read encrypted backup database files. These files contain valuable information such as deleted conversations, phone logs, photos, videos, and other data of interest. Analyzing the artifacts from the WhatsApp browser version contributes to forensic activities, providing valuable insights into the evidence that can be obtained from conversations and media files. By leveraging forensic tools and techniques, forensic practitioners can effectively retrieve and analyze data from the encrypted backup database files. In summary, this research explores the artifacts within the WhatsApp browser version, sheds light on its distinct features, and presents a forensic approach utilizing the NIST framework and forensic tools like Autopsy and FTK Imager to examine encrypted backup database files containing crucial deleted data, conversations, and media files.