Claim Missing Document
Check
Articles

Found 28 Documents
Search
Journal : Compiler

IMPLEMENTASI DATA MINING MENGGUNAKAN METODE APRIORI PADA TRANSAKSI PENJUALAN BARANG (STUDI KASUS DI CHORUS MINIMARKET) Sihombing, Erika Silvia; Honggowibowo, Anton Setiawan; Nugraheny, Dwi
Compiler Vol 1, No 1 (2012): Mei
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (622.381 KB)

Abstract

Minimarket chorus is where the sale of goods that have sales transaction data is large daily. Sale of transaction data in the Chorus Minimarket in store are usually only used as an archive only and not in the know what the benefits of a large sale of transaction data for later. The technique of data mining  can help  analyze of transactions  data large that is stored in database and can give benefits in the sale of items. Data mining process will be done is to extract  the knowledge from very large data amount of  and can then retrieve the information from these data. In this research, which used data mining with association rules is apriori method. Apriori method is used to find association patterns with a certain confidence level. Association rules used to know and give of information to find items is often be purchased together by customers. The data mining was be implemented by using Borland Delphi software and PostgreSQL databases to get information about the patterns of association rules from transaction data of item in the sale of Chorus Minimarket. Expected to application of data mining can provide benefits for the Chorus Minimarket later.
PENERAPAN SISTEM KEAMANAN DENGAN KRIPTOGRAFI ADVANCED ENCRYPTION STANDARD (AES) DAN KEY ADMINISTRATOR PADA SINKRONISASI FILE Qurniawan, Wawan; Wintolo, Hero; Nugraheny, Dwi
Compiler Vol 1, No 2 (2012): November
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (213.077 KB)

Abstract

File synchronization is the process of homogenization or adjustment between one file at a location with other files in the event that a change to be used up and running in a system. File synchronization is generally a process of data exchange in order to have the same amount of data. To maintain the confidentiality of the data necessary to maintain services for data security.            The use of cryptographic AES (Advanced Encryption Standard) to encrypt the file and combined with the administrator as an authentication key in making additions or changes to the file is a security system that can be applied to synchronize the files so that data confidentiality will be maintained.            The results of the implementation of file synchronization application by applying the AES cryptography and key administrators who carried on the local network and the Internet as a service application data synchronization between the user and the service back-up data as manual handling if storage was damaged and can avoid the theft of data from a file synchronized.
PERANCANGAN SISTEM PENGINGAT BERBASIS ANDROID MENGGUNAKAN GOOGLE MAPS DAN GPS Usmanan, Indra; Sumarsono, Sumarsono; Nugraheny, Dwi
Compiler Vol 2, No 1 (2013): Mei
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (124.876 KB)

Abstract

Human is perfect creation o f God. Hower, the human ability in processing data in not as effective as computer, as long as the data is saved in the computer memory. By utilizing the computer, such as mobile phone based on android, Google Maps, and GPS, user can make application that can remind the agenda. At this case, the data that has been saved before can be used anytime when needed. This final repot is developed a remainder application based on android using Google Maps and GPS. This system use postgreSQL database the implanted in server. It makes the android smartphone that has been installed with the reminder application become a to client. As the result, the system has some feature. From these feature, the usres are expected to use Android smartphone to help remembering the activities agenda, whenever and wherever.
SINKRONISASI TABEL BERBASIS RECORD MENGGUNAKAN SISTEM KEAMANAN AUTHENTICATION, AUTHORIZATION, ACCOUNTING (AAA) (STUDI KASUS DI STTA YOGYAKARTA) Suwito, Suwito; Wintolo, Hero; Nugraheny, Dwi
Compiler Vol 1, No 2 (2012): November
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (198.712 KB)

Abstract

Synchronization is the process of setting the course of several processes at the same time. Synchronization builds upon students' academic value table STTA Yogyakarta by comparing records for the records in the database. If there is a difference in the academic value of the table the different values will be returned as the value of the original with comparing by using the master database. Record based table synchronization is expected to address the security system on the database and provide security guarantees a safe and comfortable.Authentication is a process by which a user is identified by the server before the user using the network. In the process, the user is requesting access rights to the server to use a network. Authorization is the allocation of what services are entitled to be accessed by the user on the network. Authorization is done when the user has been declared eligible to use the network. Accounting is a process performed by the server to record all user activity in the network, such as when the user starts using the network, end user when the connection to the network, how long the user using the network, how much data is accessed from the network user.The results of the implementation of synchronization using a table based record system security authentication, authorization, accounting changes that may prevent the occurrence of data in a database, optimizing the use of stored, and enhance security systems at the database STTA center of Yogyakarta.
SISTEM PENDUKUNG KEPUTUSAN PENCARIAN RESTORAN DI YOGYAKARTA SESUAI KEBUTUHAN KONSUMEN MENGGUNAKAN METODE WEIGHTED PRODUCT Mandasari, Yofy; Honggowibowo, Anton Setiawan; Nugraheny, Dwi
Compiler Vol 2, No 2 (2013): November
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (166.144 KB)

Abstract

Decission Support System or DSS is a system thath help managers to solve a semi-structured problem. There are techniques used to make the DSS, one of them is Fuzzy Logic Multi-Attribute Decission Making (MADM). Weighted Product is a method to solve the problems using multiplication to connect the attribute ratings, where the rating attributes must be raised first with the weight of therelevant attributes. The application results show that the system can assist the consumer in deciding the restaurant according to the criteria. In addition, this application can also shorten the time in search of existing restaurants in Yogyakarta.
PENERAPAN SEO (SEARCH ENGINE OPTIMIZATION) MENGGUNAKAN TEKNIK TOGETHER IN A SINGLE CONNECTION (TSC) DALAM MENINGKATKAN KUNJUNGAN PADA SEBUAH BLOG Setyaningsih, Devia Tito; Wintolo, Hero; Nugraheny, Dwi
Compiler Vol 1, No 2 (2012): November
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (243.293 KB)

Abstract

One of the internet service used by the people of Indonesia is a blog that can be accessed via http://blogspot.com or http://wordpress.com and others. Everyone can use this medium for the purpose of publication of information in the form of text, images, sounds, or video without having to master web programming languages. One of the obstacles a person who has a blog is a way of increasing number of visitors to his blog. In order for many visitors the blog owner needs to understand about SEO (Search Engine Optimization).To allow users to blog in increasing the number of visitors and ranking his blog, they invented a system that utilizes parallel processing techniques and create a new method, named TSC (Together in a Single Connection) to increase the number of visitors, number of pages viewed and ranking.Increase blog traffic system based on parallel processing can improve the effectiveness in increasing traffic to a blog. With this system the blog owner is expected to be easier to rise to visit his blog.
SISTEM PAKAR PENILAIAN PENGUASAAN MATERI PELAJARAN BERBASIS WEBSITE DENGAN METODE BAYESIAN NETWORK (Studi Kasus di SMA Angkasa Yogyakarta) Dewi, Ni Kadek Ceryna; Honggowibowo, Anton Setiawan; Nugraheny, Dwi
Compiler Vol 2, No 1 (2013): Mei
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (192.568 KB)

Abstract

School is a place to study to implement the learning process. However, along with the development of teaching and learning technologies now can be done outside of school one of them with online media. Students at the school will usually feel a saturation point with the delivery of material in class with the different character of the teacher. For it is made a program that could provide a new learning method. Bayesian Network Methods is a Directed Acyclic Graph (DAG) and comes with a Conditional Probability Distribution Table (CPT) for each node. Bayesian Network Methods is running on the calculations to find the value of the results of the examination of the student. From the research that has been conducted on the " Expert System Assessment Mastery Of Subject Matter Of Website Based With Bayesian Network Method” o f the obtained results for the average student's ability to answer every question with 5 topics there is 28.66% from 50%.
ANALISA PERBANDINGAN WAKTU DAN KECEPATAN TRANSFER PADA MULTI PROTOCOL LABEL SWITCHING (MPLS) DENGAN VIRTUAL PRIVATE NETWORK (VPN) UNTUK PERPINDAHAN DOKUMEN PADA JARINGAN KOMPUTER Saleh, Ibrahim; Wintolo, Hero; Nugraheny, Dwi
Compiler Vol 3, No 1 (2014): Mei
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (189.009 KB)

Abstract

MPLS (Multi Protocol Label Switching) technology has been developed and mostly used by the service provider on their main network. Data packets which forwarded from one router to another router can also use VPN (Virtual Private Network) technology. VPNs were developed in the field of computer networks now have many variants, such as MPLS VPN and VPN which connects between computers or a LAN through a public network is the internet. The purpose of this final task is build a lab scale VPN network with MPLS technology use Mikrotik router RB 750GL and create a VPN connection to the STTA campus network passing the public internet. Then do a comparative analysis of the time required and the speed of transfer on both the network. The results of a comparative analysis between MPLS and VPN with the same file capacity, it appears that the MPLS network is faster in time speed and transfer speed
PENERAPAN DATA MINING DENGAN METODE INTERPOLASI UNTUK ESTIMASI PREMI BERDASARKAN PENDAPATAN NASABAH ASURANSI PRUDENTIAL DI YOGYAKARTA Pandapotan, Pandapotan; Honggowibowo, Anto Setiawan; Nugraheny, Dwi
Compiler Vol 1, No 2 (2012): November
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (135.85 KB)

Abstract

Premi in a definition can be interpreted as a fee to be paid by the customer, which is a combination of the overall cost of insurance benefits that used, and sometimes also include the amount of money invested by customers. The output of the data mining is a customers is accepted according to the prudential value of the estimated premi be gained from the number of customer revenue.Final project is, created a program of web-based application system to estimate the premi to make it easier for admin (prudential employee)  to determine the amount of premi to be paid by the customer. In this program, admin (prudential employee) just need to know the amount of customer’s income that the program will then process the results of the estimated premi.The test results is concluded that the program estimates the premi can be used easily by the admin (prudential employee) and simplify admin decisions premi estimate to the customer.
PEMBANGKITAN WARNA ANGKA TOKEK DENGAN METODE LINIER CONGRUEN METHOD (LCM) Sajati, Haruno; Nugraheny, Dwi; Hermawan, Antok
Compiler Vol 5, No 1 (2016): Mei
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (175.487 KB)

Abstract

Color blindness is an abnormality in terms of seeing certain colors that occur as a result of demage to come cells (cone cells) in the retina of the eye, so that people with color blindness can be hard  to catch a certaincolor spectrum. People suffering from color blindness would have difficulty distinguishing certain shades can not even see certain colors. Developed by Dr. Ishihara test Shinobu Ishihara in 1917, until now the Ishihara test methods still be one of the main option in almost all countries to identify someone who had color blindess. In the figure gecko color generation system with linear method congruen method (lcm) described the components of software and hardwer that is required in the manufacture of  color generator application numbers congruen gecko with a linear congruen method (lcm). The determination of the initial value of the constant linear congruen method (lcm) into the determination of the color composition result generated randomly. System testing and completion of a questionnaire completed by Guttman and Likert scale. Diman on functional testing system results obtained with Guttman scale 100% yes that users can guess the number that appears on the color generation process. And the interface testing diselesaika with Likert scale with 85% strongly agree result the system has a 94% look attractive and easy to use system.