Claim Missing Document
Check
Articles

Found 25 Documents
Search
Journal : Compiler

ANALISIS PERBANDINGAN METODE WEIGHTED PRODUCT (WP) DENGAN METODE SIMPLE ADDITIVE WEIGHTING (SAW) UNTUK PENDUKUNG KEPUTUSAN PEMILIHAN BIRO PERJALANAN PARIWISATA Ryzal Pradito; Yuliani Indrianingsih
Compiler Vol 3, No 2 (2014): November
Publisher : Institut Teknologi Dirgantara Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (148.013 KB) | DOI: 10.28989/compiler.v3i2.73

Abstract

Decision Support System (DSS) is a system that helps managers to solve a semi-structured problem. There are techniques used to make the DSS, one of them is Fuzzy Logic Multi Criteria Decission Makaing (MCDM). Weigthed Product Method (WP) and Single Additive Weighting Method (SAW) is a method to solve the problem using multiplication to connect the atribute ratings, where rating attributes must be raised first with the weight relevant attributes weights. The applications results show comparison WP methods and SAW methods is closer to the value 1, so that the SAW method is the most appropriate method to solve the problem of the selection a trvel agency tourism.
LOAD BALANCING MENGGUNAKAN METODE BUBBLE SORT PADA SISTEM DATABASE DENGAN MULTI SERVER Prayitno Prayitno; Agus Basukesti; Yuliani Indrianingsih
Compiler Vol 2, No 2 (2013): November
Publisher : Institut Teknologi Dirgantara Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (119.177 KB) | DOI: 10.28989/compiler.v2i2.51

Abstract

The increasing demand for the utilize services computer networks has increased the traffic on the network. In general, the server provides service round the clock without a break, so that problems such as breakdown of communication in the network is lost that must be avoided. This cases need for a bettersystem with high performance and reliable every time. Current server technology development will be fast but the memory access speed is slower than the increase in the consumption of bandwidth. This is one o f the factors causing the bottleneck experienced of server. With the load balancing can be provide abetter solution. The concept used to provide a server has the same service. Then, the load balancing will check the CPU usage on each server. The server will perform selection based on the value of the smallest CPU Usage o f all existing servers. The application load balancing is placed before the user accessing ofserver with the object of distributing requests from the user to any of the servers that have been selected by the load balancer. Load balancing provides many benefits to systems that use it. The first, low cost, existing resources do not need to be replaced or discarded. Second, don't always need high end equipment. Third, easily developed when needed arose and a drastic decline in the quality o f service. Load balancing is also more secure, when a failure occurs on the server, load balancing application will redirect the user to the server is still available.
PENGEMBANGAN SISTEM PENDUKUNG KEPUTUSAN PENGADAAN DAN PERSEDIAAN BARANG DENGAN METODE PERPETUAL INVENTORY METHOD DAN ECONOMIC ORDER QUANTITY ( Studi Kasus : Divisi Logistik Rumah Sakit Krakatau Medika Cilegon) Gilang Sonar Amanu; Yuliani Indrianingsih
Compiler Vol 4, No 1 (2015): Mei
Publisher : Institut Teknologi Dirgantara Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (210.34 KB) | DOI: 10.28989/compiler.v4i1.84

Abstract

The accuracy of data is the capital for making a very useful information for the company business continuity. The value of data can be very expensive if it can be made into a good information and the right target. Procurement and inventory data is one of the things to note in particular the logistics division on the company. Therefore it needs a system using a particular method that can be support the data management of goods procurement and it can also help the managers take the decision of stock control. Based on that, it can be developed to integrated system between procurement data processing and the amount of purchasing materials a single web-based application that implement a method of stock record such as perpetual inventory method and economic order quantity method as well as the methods used to support the decision in calculating the amount of inventory to be optimal. Using the development of the decision support system, some errors related to the recording of data on procurement and inaccuracies in determining the amount of inventory can be reduced. Then the company can avoid the material losses.
PENERAPAN HIDS (HOST INTRUSION DETECTION SYSTEM) DALAM MEMBANGUN KONFIGURASI FIREWALL SECARA DINAMIK Alfian Firdaus; Haruno Sajati; Yuliani Indrianingsih
Compiler Vol 2, No 2 (2013): November
Publisher : Institut Teknologi Dirgantara Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (89.028 KB) | DOI: 10.28989/compiler.v2i2.46

Abstract

Development o f information technology and computer networks in particular its services on the one hand facilitate the work of human beings, but as the very widespread use of the internet, the security level of digital data has become more vulnerable to exploitation. The problem arises when the attacks happened on a computer network in a relatively fast, so that an administrator must always keep an eye on the computer network security. Limitations o f an administrator is exactly what underlies thecreation o f a system capable o f detecting and prevention of these attacks, so the time efficiency can be actually implemented. The system is built to prevent attacks on computer networks such as port scanning, ftp, ssh and telnet brute force. This system will analyze the number o f errors that occur on login these services, and makes a decision system if the login error exceeds the tolerance of an administrator. I f the number o f errors exceeds the tolerance, it will automatically create the firewall rules in a very short duration is one minute, so the system is able to prevent the attacks which happened in a very quick time.
SISTEM KEAMANAN JAIL BASH UNTUK MENGAMANKAN AKUN LEGAL DARI KEJAHATAN INTERNET MENGGUNAKAN THC-HYDRA Cakra Aminuddin Hamka; Haruno Sajati; Yuliani Indrianingsih
Compiler Vol 3, No 1 (2014): Mei
Publisher : Institut Teknologi Dirgantara Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (211.103 KB) | DOI: 10.28989/compiler.v3i1.63

Abstract

Along with the development of current technology, making technology is very important in today's life. Security level digital data has become more vulnerable to exploitation, the problem arises when an information technology device was attacked by people who do not want to take a responsible and important data illegally, so the administrator must act quickly to secure important data. Making a data security technology on the internet is very important information. Limitations administrator underlying the creation of a system that is able to detect and defense systems against such attacks is automation, so that it can be applied to data security. The system is built to prevent attacks on computer networks with more specific on THC - Hydra. This system will analyze the number of errors in the log into the database, and if the error exceeds the tolerance rules are made by the administrator. If the error is more than 3 times in one minute, then with automation, the system will create a rule that can imprison users who do not have such access, and access to the prison in the illegal user can not perform such activities on legal access and access to activities conducted illegal user can be recorded on a file and jail.txt. So under any circumstances and not in supervising administrator, the security of other user data will be safe and can not be retrieved or viewed by a user of illegal access.