Claim Missing Document
Check
Articles

Found 26 Documents
Search

ANALISIS PERBANDINGAN METODE WEIGHTED PRODUCT (WP) DENGAN METODE SIMPLE ADDITIVE WEIGHTING (SAW) UNTUK PENDUKUNG KEPUTUSAN PEMILIHAN BIRO PERJALANAN PARIWISATA Ryzal Pradito; Yuliani Indrianingsih
Compiler Vol 3, No 2 (2014): November
Publisher : Institut Teknologi Dirgantara Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (148.013 KB) | DOI: 10.28989/compiler.v3i2.73

Abstract

Decision Support System (DSS) is a system that helps managers to solve a semi-structured problem. There are techniques used to make the DSS, one of them is Fuzzy Logic Multi Criteria Decission Makaing (MCDM). Weigthed Product Method (WP) and Single Additive Weighting Method (SAW) is a method to solve the problem using multiplication to connect the atribute ratings, where rating attributes must be raised first with the weight relevant attributes weights. The applications results show comparison WP methods and SAW methods is closer to the value 1, so that the SAW method is the most appropriate method to solve the problem of the selection a trvel agency tourism.
LOAD BALANCING MENGGUNAKAN METODE BUBBLE SORT PADA SISTEM DATABASE DENGAN MULTI SERVER Prayitno Prayitno; Agus Basukesti; Yuliani Indrianingsih
Compiler Vol 2, No 2 (2013): November
Publisher : Institut Teknologi Dirgantara Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (119.177 KB) | DOI: 10.28989/compiler.v2i2.51

Abstract

The increasing demand for the utilize services computer networks has increased the traffic on the network. In general, the server provides service round the clock without a break, so that problems such as breakdown of communication in the network is lost that must be avoided. This cases need for a bettersystem with high performance and reliable every time. Current server technology development will be fast but the memory access speed is slower than the increase in the consumption of bandwidth. This is one o f the factors causing the bottleneck experienced of server. With the load balancing can be provide abetter solution. The concept used to provide a server has the same service. Then, the load balancing will check the CPU usage on each server. The server will perform selection based on the value of the smallest CPU Usage o f all existing servers. The application load balancing is placed before the user accessing ofserver with the object of distributing requests from the user to any of the servers that have been selected by the load balancer. Load balancing provides many benefits to systems that use it. The first, low cost, existing resources do not need to be replaced or discarded. Second, don't always need high end equipment. Third, easily developed when needed arose and a drastic decline in the quality o f service. Load balancing is also more secure, when a failure occurs on the server, load balancing application will redirect the user to the server is still available.
PENGEMBANGAN SISTEM PENDUKUNG KEPUTUSAN PENGADAAN DAN PERSEDIAAN BARANG DENGAN METODE PERPETUAL INVENTORY METHOD DAN ECONOMIC ORDER QUANTITY ( Studi Kasus : Divisi Logistik Rumah Sakit Krakatau Medika Cilegon) Gilang Sonar Amanu; Yuliani Indrianingsih
Compiler Vol 4, No 1 (2015): Mei
Publisher : Institut Teknologi Dirgantara Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (210.34 KB) | DOI: 10.28989/compiler.v4i1.84

Abstract

The accuracy of data is the capital for making a very useful information for the company business continuity. The value of data can be very expensive if it can be made into a good information and the right target. Procurement and inventory data is one of the things to note in particular the logistics division on the company. Therefore it needs a system using a particular method that can be support the data management of goods procurement and it can also help the managers take the decision of stock control. Based on that, it can be developed to integrated system between procurement data processing and the amount of purchasing materials a single web-based application that implement a method of stock record such as perpetual inventory method and economic order quantity method as well as the methods used to support the decision in calculating the amount of inventory to be optimal. Using the development of the decision support system, some errors related to the recording of data on procurement and inaccuracies in determining the amount of inventory can be reduced. Then the company can avoid the material losses.
PENERAPAN HIDS (HOST INTRUSION DETECTION SYSTEM) DALAM MEMBANGUN KONFIGURASI FIREWALL SECARA DINAMIK Alfian Firdaus; Haruno Sajati; Yuliani Indrianingsih
Compiler Vol 2, No 2 (2013): November
Publisher : Institut Teknologi Dirgantara Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (89.028 KB) | DOI: 10.28989/compiler.v2i2.46

Abstract

Development o f information technology and computer networks in particular its services on the one hand facilitate the work of human beings, but as the very widespread use of the internet, the security level of digital data has become more vulnerable to exploitation. The problem arises when the attacks happened on a computer network in a relatively fast, so that an administrator must always keep an eye on the computer network security. Limitations o f an administrator is exactly what underlies thecreation o f a system capable o f detecting and prevention of these attacks, so the time efficiency can be actually implemented. The system is built to prevent attacks on computer networks such as port scanning, ftp, ssh and telnet brute force. This system will analyze the number o f errors that occur on login these services, and makes a decision system if the login error exceeds the tolerance of an administrator. I f the number o f errors exceeds the tolerance, it will automatically create the firewall rules in a very short duration is one minute, so the system is able to prevent the attacks which happened in a very quick time.
SISTEM KEAMANAN JAIL BASH UNTUK MENGAMANKAN AKUN LEGAL DARI KEJAHATAN INTERNET MENGGUNAKAN THC-HYDRA Cakra Aminuddin Hamka; Haruno Sajati; Yuliani Indrianingsih
Compiler Vol 3, No 1 (2014): Mei
Publisher : Institut Teknologi Dirgantara Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (211.103 KB) | DOI: 10.28989/compiler.v3i1.63

Abstract

Along with the development of current technology, making technology is very important in today's life. Security level digital data has become more vulnerable to exploitation, the problem arises when an information technology device was attacked by people who do not want to take a responsible and important data illegally, so the administrator must act quickly to secure important data. Making a data security technology on the internet is very important information. Limitations administrator underlying the creation of a system that is able to detect and defense systems against such attacks is automation, so that it can be applied to data security. The system is built to prevent attacks on computer networks with more specific on THC - Hydra. This system will analyze the number of errors in the log into the database, and if the error exceeds the tolerance rules are made by the administrator. If the error is more than 3 times in one minute, then with automation, the system will create a rule that can imprison users who do not have such access, and access to the prison in the illegal user can not perform such activities on legal access and access to activities conducted illegal user can be recorded on a file and jail.txt. So under any circumstances and not in supervising administrator, the security of other user data will be safe and can not be retrieved or viewed by a user of illegal access.
EDUKASI PEMERIKSAAN PAYUDARA SENDIRI (SADARI) SEBAGAI PENDETEKSIAN AWAL KANKER PAYUDARA BAGI KARYAWATI DAN MAHASISWI Nugraheny, Dwi; Asih Pujiastuti; Esa Rengganis; Yuliani Indrianingsih; Anton Setiawan H; Redha Okta Silfina
Jurnal Edukasi Pengabdian Masyarakat Vol 5 No 1 (2026): JANUARI 2026
Publisher : FIP UNIRA MALANG

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36636/eduabdimas.v5i1.8381

Abstract

At present, breast cancer is commonly found among women under 50 years old. This situation may occur due to lifestyle changes, limited knowledge about how to care for breast health, and the lack of early detection habits. One of the easiest methods to detect breast cancer symptoms early is SADARI, or Self-Breast Examination. So far, SADARI education has never been conducted at the Institut Teknologi Dirgantara Adisutjipto. Therefore, this community service activity aims to educate female students and staff at Institut Teknologi Dirgantara Adisutjipto about breast cancer using the SADARI method. This education was carried out through health counseling by medical experts experienced in breast cancer, as well as sharing sessions with breast cancer survivors. Based on the pre-test and post-test results, participants’ knowledge improved from an average of 79.97% to 84.89%. Through this SADARI breast cancer education, it is expected that female students and staff at Institut Teknologi Dirgantara Adisutjipto will become more aware, develop early detection habits, and help prevent future risks, thereby improving recovery chances and reducing disease severity.