Claim Missing Document
Check
Articles

Found 32 Documents
Search
Journal : Compiler

ALGORITMA MASIH MUSLIATUN (MM) UNTUK MENDUKUNG SISTEM OTOMATISASI PENDAFTARAN PRAKTIKUM DENGAN PENGUJIAN PADA JARINGAN KOMPUTER (STUDI KASUS DI STTA YOGYAKARTA) Musliatun, Masih; Sajati, Haruno; Indrianingsih, Yuliani
Compiler Vol 2, No 1 (2013): Mei
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (214.016 KB)

Abstract

Practicum registration systems that exist on campus STTA previously done manually, where students will sign up to the admin to bring proof of payment practicum. Students are free to choose his own class, this often resulted in unbalanced number of students in the classroom lab that is consideredless  effective way. This makes the emergence of the idea to establish an MM algorithm is applied to a practical application o f automation systems. MM algorithm works by determining many lab classes based on students who took the KRS. Furthermore, students who have paid practicum will be immediately incorporated into the classes that are available with regard to the number of students and GPA o f students per class, so it will obtain practical classes by the number o f students and the average GPA o f each class balanced.Concept application using client-server database, where the database is on the Local Area Network (LAN) STTA. To facilitate the management admin, then the application will be tested on the LAN network and VPN (Virtual Private Network) network. LAN is a computers network that are connected to a computer server by using specific topologies, typically used in areas of the building or area a distance o f not more than 1 km (local area). While VPN is a secure way to access the Local Area Network that is in range, using the Internet or other public network to perform packet data transmission in private. By using a VPN, users can access the computer that is on the LAN even though the user is not in the same location with a LAN.
PERANCANGAN DAN PENERAPAN ALGORITMA NAKULA SADEWA UNTUK MENGATASI DUPLIKASI PEMILIHAN DI TEMPAT PEMUNGUTAN SUARA Prayogi, Yogi Priyo; Wintolo, Hero; Indrianingsih, Yuliani
Compiler Vol 2, No 2 (2013): November
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (246.828 KB)

Abstract

The security o f election's data in a manual election process is susceptible to some fraud activity, one of them is voter's identity theft activity which will be used to vote more than one time. The regulation which allow the voter to vote on another town has  became a hole that can be used the perpetrator to vote using stolen identity as no one knows him and his true identity. This fraud activity will have direct impact to the result o f election. This fraud can be contained by using Nakula Sadewa Algorithm which will analyze and compare the voter's home voting place to the voting place that the voter's use to do the voting activity. The voter's can still vote on another town, but heavily encouraged to vote on his hometown.
PERANCANGAN APLIKASI UNTUK PERALATAN PEMANTAU SUHU MENGGUNAKAN RADIO FREQUENCY (RF) Kurniawan, Wahid; Dermawan, Denny; Indrianingsih, Yuliani
Compiler Vol 1, No 2 (2012): November
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (176.552 KB)

Abstract

Temperature is a part of the natural condition that  related to human activities. Many human activity is affected by temperature fluctuation factors. For example, in this case is a temperature monitoring at these broiler farms and database monitoring center computer. Room temperature for  places are two examples of the human activities that the temperature factor is concerned. Until now, time temperature monitoring activity is done manually, thus it is need a monitoring tool that can be viewed from  the computer interface.To save time and cost, application for temperature monitoring equipment is made so that the results can be seen from a distance. The applications are user friendly, so users can easily find out the temperature value.Application for temperature monitoring equipment is useful to support the activities of monitoring the temperature. From the experimental results, the application for temperature monitoring equipment that uses radio frequency results can be viewed from a computer interface, so as to streamline the performance of temperature monitoring.
PENERAPAN ALGORITMA ARI BORNEO (AB) UNTUK PEMBACAAN TEKS DENGAN MEMANFAATKAN MICROSOFT SPEECH DAN ID1 Restani, Ari; Honggowibowo, Anton Setiawan; Indrianingsih, Yuliani
Compiler Vol 2, No 2 (2013): November
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (202.093 KB)

Abstract

Reading is an activity person to obtain information from something written. Reading involves recognition of the symbol and the letters that make a language. But there are some people who are lazy to read text in English language which is not a language that is used everyday by Indonesian people. In addition to reading, there are also the most common activities to obtain information that is heard. Hear is a way to gain an understanding of the meaning of the information in the form or sound using auditory senses. Reading activities contributed 10% ability for know information, with listening, knowing information can reach 30%. With conditions like this, then it needs an alternative media that can help treat the condition. The alternative media that can be made is text to speech fo r read text in Indonesia language and English language, for detection language using Ari Borneo Algorithm. These systems are made using Delphi 7 programming language, MBROLA Tools as Indonesia-speaking sound generators and Microsoft Speech API as English sound generator. Through this system, userscan absorb information from listening to the reading o f text by both systems.
DISEMINASI INFORMASI DALAM PENERIMAAN SISWA BARU BERBASIS ANDROID PADA SMA NEGERI ABUNG TINGGI LAMPUNG UTARA Novrianto, Novrianto; Sumarsono, Sumarsono; Indrianingsih, Yuliani
Compiler Vol 2, No 1 (2013): Mei
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (106.373 KB)

Abstract

Information regarding the admission of new students in a school is very important to support the smooth reception o f new students. Good information distribution process, will improve the quality of education in a school. Application o f these new students is a solution that can parents help their parents in distributing information about the graduation o f their students in a school. The application supports the announcement o f the distribution process before the announcement o f new admissions at the school run. This application was developed using Java programming language, assisted by Net.bin for Android Operating System environment. This method is based on client-server, where mobile devices like cell phones or netbooks as a web server as a client and server. Parents are parents who have Android-based mobile devices, can use this application to support the admission o f new students. Android mobile applications can make it easier for parents to see the announcement o f new admissions, thereby saving time getting to know their students are accepted or not on SMA High Abung, North Lampung.
PERANCANGAN DAN PENERAPAN ALGORITMA JAWA UNTUK MENCARI JARAK ANTARA DUA BUAH KOMPUTER DALAM JARINGAN WIRELESS LAN/HOSTPOT Razikin, Khairur; wintolo, hero; Indrianingsih, Yuliani
Compiler Vol 1, No 1 (2012): Mei
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (527.637 KB)

Abstract

Wireless networks / hostspot using wave or signal transmission media. Waves or signals emitted from a device called an access point having a particular frequency. Signal beam is formed a circular pattern in which the antenna from the access point to the source signal. In a wireless network signal is captured and used a computer to be able to communicate with each other. PING technique is a method to double check the connection by sending data packets from the sending computer to the destination computer. This process can be seen from the travel time required to transmit data packets. So there is some problems how to convert time obtained from the PING into the distance. Algorithm Jawa can be used to convert units of time-based PING the wireless LAN / hostspot into the distance. Basically, two computers that are in a wireless LAN / hostspot will form a triangular pattern. This pattern will be used algorithm jawa to determine the distance between two computers within the wireless LAN / hostspot by utilizing modifications pythagorean theorem for isosceles triangular pattern and the large angle of 400.
SISTEM KEAMANAN JAIL BASH UNTUK MENGAMANKAN AKUN LEGAL DARI KEJAHATAN INTERNET MENGGUNAKAN THC-HYDRA Hamka, Cakra Aminuddin; Sajati, Haruno; Indrianingsih, Yuliani
Compiler Vol 3, No 1 (2014): Mei
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (211.103 KB)

Abstract

Along with the development of current technology, making technology is very important in today's life. Security level digital data has become more vulnerable to exploitation, the problem arises when an information technology device was attacked by people who do not want to take a responsible and important data illegally, so the administrator must act quickly to secure important data. Making a data security technology on the internet is very important information. Limitations administrator underlying the creation of a system that is able to detect and defense systems against such attacks is automation, so that it can be applied to data security. The system is built to prevent attacks on computer networks with more specific on THC - Hydra. This system will analyze the number of errors in the log into the database, and if the error exceeds the tolerance rules are made by the administrator. If the error is more than 3 times in one minute, then with automation, the system will create a rule that can imprison users who do not have such access, and access to the prison in the illegal user can not perform such activities on legal access and access to activities conducted illegal user can be recorded on a file and jail.txt. So under any circumstances and not in supervising administrator, the security of other user data will be safe and can not be retrieved or viewed by a user of illegal access.
OTOMATISASI PENERIMAAN DAN PENGIRIMAN PESAN DENGAN SISTEM TERDISTRIBUSI UNTUK MENDUKUNG PENYEBARAN INFORMASI AKADEMIK Setyoadi, Wangsit; Wintolo, Hero; Indrianingsih, Yuliani
Compiler Vol 1, No 1 (2012): Mei
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (402.097 KB)

Abstract

Advances in technology are increasing rapidly, especially in the field of information and communication technology provides convenience in exchanging information. One widely used communication tool today is the mobile phones which have facilities sending messages or SMS (Short Message Service). With the mobile phone application development, application technology of short message or SMS widely used for more general purposes, one of which is in the academic field. To facilitate the exchange of academic information, including financial data, grades, and exam schedules, distributed systems into tools that are able to provide and process information dynamically.To facilitate the exchange of academic information between the school and students, they invented a system that is distributed for the dissemination of academic information that can be accessed via SMS.Academic information dissemination system based on short message or SMS can enhance the effectiveness of the dissemination of information between the school and students. With a system of information exchange is expected to be faster and more controlled because the cost for all messages can be recorded.
SISTEM PENDUKUNG KEPUTUSAN UNTUK MENENTUKAN POSISI PEMAIN IDEAL DALAM TIM SEPAK BOLA DENGAN METODE ALGORITMA GENETIKA Alprianta, Hizkia; Honggowibowo, Anton Setiawan; Indrianingsih, Yuliani
Compiler Vol 1, No 2 (2012): November
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (174.436 KB)

Abstract

So far, there are coaches who are less precise in determining the ideal position of the player as it only relies on instinct and the ego of the players so that there is still a coach who has not been able to objectively assess the players.By utilizing the method of Genetic Algorithm as Decision Support System (DSS) in the process of determining the ideal position of a player who uses several criteria (multicriteria) to choose a proper player. DSS is helping coach in making the right decisions and Genetic Algorithm is used as a model for multicriteria weighting in the selection process. This application was built with tools Borland Delphi (7.0) as the user interface design and media processing PostgreSQL as its database.            Based on these results we can conclude that this application expected to assist the coaches in the decision making process and can change the appraisal of which are subjective to more objective, to determine the ideal position for a player, can determine the best position of each position of a number of players and the expected results of the Genetic Algorithm on the system constructed in accordance with the results of manual calculations.
IMPLEMENTASI LOAD BALANCING DENGAN METODE BUBBLE SORT STUDI KASUS PENGISIAN KRS DI STTA Hidayat, Rahmad; Basukesti, Agus; Indrianingsih, Yuliani
Compiler Vol 2, No 1 (2013): Mei
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (203.588 KB)

Abstract

The increase o f request brings large traffic to networks especially to data centers, large enterprises and portal websites. In addition, server provides more and more information by using applications. Most servers have to provide all-day services, and any service interruption or key data loss in communication will result in business loss. All these require high performance and high reliability on application services. However, the increase of server processing speed and memory access speed is greatly lower than that o f the network bandwidth and applications. In addition, the increase o f network bandwidth makes server resource consumption more serious. Therefore, the servers become the network bottleneck, and the traditional single device mode becomes the network failure point. Load balancing (LB) comes to provide a good solution by providing multiple servers form a server cluster, with each server providing the same or similar services. A load balancing application is managed at the front end o f the server cluster to distribute user requests in the server cluster according to pre-configured load balancing rules, provide services, and maintain the servers. Load balancing bring good advantage such as bring faster application, low cost, the available resources will not be wasted, and no high-end devices are needed for the new resources. It is expandability. When services are increasing, the system can satisfy the needs by adding servers, without affecting the existing services and reducing service quality. Load balancing also has high reliability. When a server fails, the LB application or LB device redistributes user requests to other servers in the same cluster, ensuring uninterrupted services.