Claim Missing Document
Check
Articles

Found 52 Documents
Search
Journal : Compiler

PEMANFAATAN DIRECTION API ( APPLICATION PROGRAMMING INTERFACE ) PADA LAYANAN GOOGLE MAP UNTUK PENCARIAN RUMAH IBADAH DI KOTAMADYA YOGYAKARTA PADA HANDPHONE BERBASIS ANDROID Addiwinoto, Gunawan; wintolo, hero; Nugraheny, Dwi
Compiler Vol 1, No 2 (2012): November
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (144.038 KB)

Abstract

Since the smartphone android as open technology was found, the Users can take some advantages from Google’s map service which is exist in the application to build the applications service. API direction can using HTTP to determine the location of the inter-view destination, mileage and road routes that can be passed either as a text string or as a latitude or longitude that can be implemented through a Google map.By using this direction google map service, API, can be used this service to create a searching application service to search the houses of worship. Besides used  for knowing generally the houses of worship that exist around the Yogyakarta city, the determination of the shortest path is needed because in this life people often travel from one place to another by considering the efficiency of time, mileage and expenses.Searching service of the houses of worship is existed in the application, it can be tested in various service providers through the internet and GPS signal strength which is optimal enough to obtain the shortest distance with the direction on the map and with a percentage accuracy of the average distance between Google on the map with the actual distance of 99%.
MANAGEMENT SERVER BERBASIS SMS GATEWAY STUDI KASUS PADA GCM EDNOVATION YOGYAKARTA Hidayatullah, Arif; Wintolo, Hero
Compiler Vol 3, No 2 (2014): November
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (128.431 KB)

Abstract

Trust is a key factor in online communication, a hosting that can be accessed quickly and almost never had an error would indicate that the hosting has managed seriously in serving consumers. Therefore a hosting requires regular maintenance and handling of error as soon as possible before consumers feel the effects. On the other side hosting providers need to protect their systems to provide access to others who don’t have the right and protect it using a firewall. Those two things became very difficult to do simultaneously considering the speed and ease of access contrary to the security of the hosting. There are many ways in which the administrators to handling this case.One of many ways is create a private network that can only be accessed from within the network, during time for treatments this private hosting use SMS as  medium, this media have been chosen because it can directly installed within the private network.By using this sms media, administrator can make application that can do the repair server directly without being worried with the danger of the public internet network, because application running on a private network. Applications can also be built more complex so that application will help administrator to monitor condition of the server and repair errors on the server, administrators can do it anywhere without being dependent on a stable internet connection.
PERANCANGAN DAN PENERAPAN ALGORITMA NAKULA SADEWA UNTUK MENGATASI DUPLIKASI PEMILIHAN DI TEMPAT PEMUNGUTAN SUARA Prayogi, Yogi Priyo; Wintolo, Hero; Indrianingsih, Yuliani
Compiler Vol 2, No 2 (2013): November
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (246.828 KB)

Abstract

The security o f election's data in a manual election process is susceptible to some fraud activity, one of them is voter's identity theft activity which will be used to vote more than one time. The regulation which allow the voter to vote on another town has  became a hole that can be used the perpetrator to vote using stolen identity as no one knows him and his true identity. This fraud activity will have direct impact to the result o f election. This fraud can be contained by using Nakula Sadewa Algorithm which will analyze and compare the voter's home voting place to the voting place that the voter's use to do the voting activity. The voter's can still vote on another town, but heavily encouraged to vote on his hometown.
PERBANDINGAN METODE FUZZY TSUKAMOTO DAN MAMDANI UNTUK MEREKOMENDASI NILAI SIMPANAN TABUNGAN BERDASARKAN SALDO RATA-RATA HARIAN PADA KOPERASI JASA KEUANGAN SYARIAH (STUDI KASUS DI BMT BINA IHSANUL FIKRI) Omara, Safik; Honggowibowo, Anton Setiawan; Wintolo, Hero
Compiler Vol 1, No 1 (2012): Mei
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (501.07 KB)

Abstract

Funding accumulation should be designed to attract people to save in the institution money islamic. Savings Islamic investment is to apply the system to yield a return on investment. The value of customer revenue will never be the same each month even though they are the same a mount. Therefore, we need an alternative form of information storage decisions to be based recommendations for the specific results. For the results calculated by the method of the average daily balance is multiplied by other factors such as per classification average balance bank of funds, and the ratio(%). The average balance is the accumulation of sediment balance is divided by the number of days in a month. The application of fuzzy inference systems Tsukamoto and madman will be compared to the recommended savings will be applied to the system. Fuzzy logic has a degree of  membership that represented the values 0 and 1, to be more balanced in the calculation is limited by certain factors. Factors include the amount of sediment balance and sediment balance your time to calculate the value of savings products or recommendations.Application of fuzzy Tsukamoto and  Mamdani gives an overview of the differences indetermining the final outcome of the process defuzzifikasi, so that the known method is more suitable for recommending the value of deposits with a limited output of certain values (lower and upper limit of deposits). Fuzzy calculations have been tested with analysis of mathematical calculations manually and generate the same value.ListenRead phonetically
PERANCANGAN APLIKASI CHAT TRANSLATOR BERBASIS DESKTOP UNTUK KOMUNIKASI DUA BAHASA DALAM JARINGAN KOMPUTER Prasetya, Pradana Nur; Wintolo, Hero; Retnowati, Nurcahyani Dewi
Compiler Vol 3, No 1 (2014): Mei
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (171.467 KB)

Abstract

One way of written communication is to send a message to the others. With the current technological developments, written communication can be supported by the computer and internet media so that messages sent can be delivered to target internet users in a short time and geographical distance is no longer a barrier of communication. In communicating between countries is often used in English, but that will be an obstacle when the language used to write the message was not understood by the other person and vice versa. Seeing this condition, then there needs to be an alternative media to overcome these obstacles. One of them is to design a bilingual (Indonesian-English) chat translator application. The system was created using Delphi 7 as a programming language and Oracle as Indonesian and English vocabulary storage database. Through this system, users can send messages using Indonesian or English and receive messages according to language used. The result from the design of this application indicates that the application is able to translate the text that is sent into the appropriate language which is controlled by interlocutors. So it can be a solution to communicate although with different language. However, the ability of the translator is very dependent on the current record in the dictionary table, so the translation can be developed in subsequent research to be more complete and better.
PERANCANGAN DAN PENERAPAN ALGORITMA JAWA UNTUK MENCARI JARAK ANTARA DUA BUAH KOMPUTER DALAM JARINGAN WIRELESS LAN/HOSTPOT Razikin, Khairur; wintolo, hero; Indrianingsih, Yuliani
Compiler Vol 1, No 1 (2012): Mei
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (527.637 KB)

Abstract

Wireless networks / hostspot using wave or signal transmission media. Waves or signals emitted from a device called an access point having a particular frequency. Signal beam is formed a circular pattern in which the antenna from the access point to the source signal. In a wireless network signal is captured and used a computer to be able to communicate with each other. PING technique is a method to double check the connection by sending data packets from the sending computer to the destination computer. This process can be seen from the travel time required to transmit data packets. So there is some problems how to convert time obtained from the PING into the distance. Algorithm Jawa can be used to convert units of time-based PING the wireless LAN / hostspot into the distance. Basically, two computers that are in a wireless LAN / hostspot will form a triangular pattern. This pattern will be used algorithm jawa to determine the distance between two computers within the wireless LAN / hostspot by utilizing modifications pythagorean theorem for isosceles triangular pattern and the large angle of 400.
USE VLSM (VARIABLE LENGTH SUBNET MASKING) ANDROID BASED SIMULATOR FOR ADMINISTRATIVE SUPPORT NETWORK Aji, Bimio Wahyu; Wintolo, Hero; Nugraheny, Dwi
Compiler Vol 2, No 1 (2013): Mei
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (133.783 KB)

Abstract

Administration o f networking IP addressing especially IP version 4 have a less using IP address for the limited. Through for the using by networking o f services base on TCP/IP addressing, however that can be used VLSM (Variable Length Subnet Masking) method o f subnetting addressing thorough the public area networking to divided IP addressing private it's called as sub network ID or Local Area Network (IP private). Therefore dividing have choose a calculate IP addressing o f VLSM Method used by simulator calculating IP address subnetting. The use o f goal-based subnetting android simulator to facilitate the distribution o f IP within the network administrator by using the simulator VLSM IP subnetting calculations automatically and efficiently. An application that helps administrators in calculating VLSM subnetting IP, to support network administration so that administrators can make solving the network ID into sub-networks. IP results obtained from the simulator, can be tested with VLSM on various internet network service providers obtain a quite optimal for purposes o f network administration.
KUALITAS RUNNING TEXT DALAM PEMBERIAN INFORMASI DI LINGKUNGAN KAMPUS SEKOLAH TINGGI TEKNOLOGI ADISUTJIPTO YOGYAKARTA Septianto, Rivcky; Sumarsono, Sumarsono; Wintolo, Hero
Compiler Vol 1, No 2 (2012): November
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (223.035 KB)

Abstract

Requirement about lectures information quickly, easily, accuratelly, and cheaply. To support lectures activity, such as lectures information scedules, lectures changed scedules, and the other informations based on running text with SMS Gateway in one way. In order to increase labor produktivity, data services, and information and increase computer skills in campus suroundings or college, that needs to be pursued in service enhancement effectively and efficiently, using information technology with running text based.In this application contains four interfaces, such as server application view, client application view, wireless fidelity (login hotspot) view, web view. Database design is a effort to make model of data management is still first draft. This database will be use to store data from the application.The result of whole research that can be analyze the test simulation is about mechanics work process from system over all. On the whole analyze result consist of the basic concept that built to become a system which has been discussed on the previous chapter.
OTOMATISASI PENERIMAAN DAN PENGIRIMAN PESAN DENGAN SISTEM TERDISTRIBUSI UNTUK MENDUKUNG PENYEBARAN INFORMASI AKADEMIK Setyoadi, Wangsit; Wintolo, Hero; Indrianingsih, Yuliani
Compiler Vol 1, No 1 (2012): Mei
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (402.097 KB)

Abstract

Advances in technology are increasing rapidly, especially in the field of information and communication technology provides convenience in exchanging information. One widely used communication tool today is the mobile phones which have facilities sending messages or SMS (Short Message Service). With the mobile phone application development, application technology of short message or SMS widely used for more general purposes, one of which is in the academic field. To facilitate the exchange of academic information, including financial data, grades, and exam schedules, distributed systems into tools that are able to provide and process information dynamically.To facilitate the exchange of academic information between the school and students, they invented a system that is distributed for the dissemination of academic information that can be accessed via SMS.Academic information dissemination system based on short message or SMS can enhance the effectiveness of the dissemination of information between the school and students. With a system of information exchange is expected to be faster and more controlled because the cost for all messages can be recorded.
PENERAPAN SISTEM KEAMANAN DENGAN KRIPTOGRAFI ADVANCED ENCRYPTION STANDARD (AES) DAN KEY ADMINISTRATOR PADA SINKRONISASI FILE Qurniawan, Wawan; Wintolo, Hero; Nugraheny, Dwi
Compiler Vol 1, No 2 (2012): November
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (213.077 KB)

Abstract

File synchronization is the process of homogenization or adjustment between one file at a location with other files in the event that a change to be used up and running in a system. File synchronization is generally a process of data exchange in order to have the same amount of data. To maintain the confidentiality of the data necessary to maintain services for data security.            The use of cryptographic AES (Advanced Encryption Standard) to encrypt the file and combined with the administrator as an authentication key in making additions or changes to the file is a security system that can be applied to synchronize the files so that data confidentiality will be maintained.            The results of the implementation of file synchronization application by applying the AES cryptography and key administrators who carried on the local network and the Internet as a service application data synchronization between the user and the service back-up data as manual handling if storage was damaged and can avoid the theft of data from a file synchronized.
Co-Authors . Sudaryanto Addiwinoto, Gunawan Aditya Wisnu Pratama Aditya, Reza Aditya, Reza Aji, Bimio Wahyu Alriavindra Funny, Rindu Amalia Farhati Aminuyati Anggaraini Kusumaningrum Anggit Tri Widiastuti Anggit Tri Widiastuti, Anggit Tri Anggraini Kusumaningrum Anggraini Kusumaningrum Anggraini Kusumaningrum, Anggraini Anton Setiawan Honggowibowo Anton Setiawan Honggowibowo Anton Setiawan Honggowibowo Anton Yudhana Arief Dwi Nugroho ARIF HIDAYATULLAH Arwin Datumaya Wahyudi Sumari Astika Ayuningtyas Astika AyuningTyas, Astika Astuti, Ellyana Mega Dewantri Bambang Sudibya Bambang Sudibya, Bambang Basuki Nugroho Susanto Basuki Nugroho Susanto, Basuki Nugroho Bimio Wahyu Aji Chris Tri Widyarto Christoporus Galih Pramudito Deny Hp., Fathul Fata Derry Purnamasari Derry Purnamasari, Derry Devia Tito Setyaningsih Dwi Nugrahenny Dwi Nugrahenny, Dwi Dwi Nugraheny Dwi Nugraheny Dwi Nugraheny Dwi Nugraheny, Dwi Dwi Paradita, Lalu Septian Emy Setyaningsih Evi Wahyuningsih Eviana Yulianti Saputri Fathul Fata Deny Hp. Fera Suprapti Friska Ayu Dhawara Galih Andita Sukma Gilang Wiratmaja Gregorius Ferdian F.D.Setyawan Gunawan Addiwinoto Habib Satrio Atmojo Handoko Widya Kusuma HARLIYUS AGUSTIAN Harliyus Agustian Haruno Sajati Hasibuan, Piniel Romulia Ibrahim Saleh Ibrahim, Andi Ahmad Iswar Ida Ayu Putu Sri Widnyani Imam Riadi Irawaty, Mardiana Khairur Razikin Lalu Septian Dwi Paradita Lalu Suwandi Yusuf Moh.Bambang Haryo Seto Muhamad Hafish Muhammad Imam, Muhammad Muhammad Rivai Ngadiyono Ngadiyono, Ngadiyono Nurcahyani Dewi Retnowati Nurcahyani Dewi Retnowati Nuryatno, Edi Triono Omara, Safik Piniel Romulia Hasibuan Pradana Nur Prasetya Pramudito, Christoporus Galih Prasetya, Pradana Nur Prasetyo Fendriyanto, Prasetyo Pratama, Aditya Wisnu Prayogi, Yogi Priyo Pujiastuti, Asih Qurniawan, Wawan Razikin, Khairur Rivcky Septianto RIYAN ANDRIYANTO Safik Omara Saiful Bahri Salam Aryanto Saleh, Ibrahim Septianto, Rivcky Setyaningsih, Devia Tito Setyoadi, Wangsit Sri Mulyani Sudaryanto Sudaryanto Suhirman Sukma, Galih Andita Sumarsono Sumarsono Sumarsono Sumarsono Suprapti, Fera SUWITO SUWITO Suwito Suwito Syafrudin Abdie Triono Nuryatno, Edi Wahyu Hamdani Wangsit Setyoadi Wawan Qurniawan Widyarto, Chris Tri Wiratmaja, Gilang Wiwik Handayani Yenni Astuti Yenni Astuti, Yenni Yogi Priyo Prayogi Yuliani Indrianingsih Yuliani Indrianingsih Yuliani Indrianingsih Yuliani Indrianingsih Yuliani Indrianingsih Yusuf, Lalu Suwandi Zulham Zulham Zuliana Zuliana Zuliana, Zuliana