Claim Missing Document
Check
Articles

Found 52 Documents
Search
Journal : Compiler

PENERAPAN SISTEM TERDISTRIBUSI PADA TOGETHER IN A SINGLE CONNECTION (TSC) BERBASIS WEB Zuliana, Zuliana; Wintolo, Hero; Sudibya, Bambang
Compiler Vol 2, No 2 (2013): November
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (142.647 KB)

Abstract

Distributed system is a computer networking technology which can be hardware or software. In hardware distributed system by a collection of computers that are heterogeneous, being in the software system is distributed in the form of software that connects two applications in the form of client and server side. TSC method is a method that already existed before, which can be used increase the ranking o f a blog. Implementation distributed system for TSC using landing page as the intermediary. Landing page serves as a liaison between web applications or blogs are listed as a member to raise the ranking of a database on the application server side. When someone does click on landing page seoindonesia, will open a blog or other web members. Landing page so it can be used as a way to count the number of visitors to a blog or website, which in turn can increase the number o f page visits and 1 with 1 clickbutton seoindonesia for test in histats.com.
LAYANAN CLOUD COMPUTING BERBASIS INFRASTRUCTURE AS A SERVICE MENGGUNAKAN ANDROID Wintolo, Hero; Dwi Paradita, Lalu Septian
Compiler Vol 4, No 2 (2015): November
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (168.669 KB)

Abstract

Cloud computing, one form of information technologies are widely used in the field of computer networks or the Internet. Cloud computing consists of computer hardware, computer networking devices, and computer software, the cloud computing there are three services provided include (SaaS) Software as a Service (PaaS) Platform as a Service, and (IaaS) Infrastructure as a Service. Application cloud computing services in the wake of this system is a service-based data storage infrastructure as a service by using android smartphone as a storage medium, which utilizes FTP Server which is already available on the smartphone. This certainly supports the easy storage of data that utilize various types of internal and external storage on smartphones that serves as a storage server. In addition to the functions of storage available, this service can accommodate streaming function .mp3 file type. Implementation result of the system can be implemented on a local network using a wireless LAN. In addition, the results of user testing using Likert method shows the application can run and function properly
PENERAPAN ALGORITMA SAPA PADA JARINGAN AD-HOC UNTUK MENGIDENTIFIKASI KOMPUTER BERBASIS MAC ADDRESS Widyarto, Chris Tri; Wintolo, Hero; Indrianingsih, Yuliani
Compiler Vol 2, No 1 (2013): Mei
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (739.772 KB)

Abstract

Wi-Fi waves are commonly used as an intermediary in the communication relationships in the wireless network. However, the use o f Wi-Fi waves can be used in addition to getting the relationship in the network, the user is also able to detect and identify other devices by using Wi-Fi waves. Ad-hoc network is a network that can be built independently by the computer with the Microsoft Windows operating system, to enable ad-hoc device has to have an identity that is SSID, the SSID is then activate the device can be detected by other devices. Activation is done ad-hoc by the netsh command is a shell command in the Windows 7 operating system. An ID must be unique for each device as there is no dual identity, to maximize the identification process. Utilizing MAC address as an identity is used, allowing the device to be uniquely identified. In addition to the MAC address is added to the device profile in the identity o f the device for easier identification. Sapa application users can identify the device is detected, and recognize it as a co-owned devices. Scheme which is the concept o f the algorithm Sapa. Sapa application allows device activation or notebook PC with the Windows 7 operating system to be detected and detected by other devices with the Windows 7 operating system and applications are also active Sapa. Communication is established indirect communication that occurs in a single direction. Detection range can be done up to 77 meters distance.
PERANCANGAN WEB FRANCHISE PEMPEK DAN MOBILE MONITORING BERBASIS ANDROID Suprapti, Fera; Wintolo, Hero; Honggowibowo, Anton Setiawan
Compiler Vol 1, No 1 (2012): Mei
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (542.845 KB)

Abstract

Franchising is essentially a marketing concept in order to expand the network of one way that is as strong just a conventional marketing strategy in developing the business franchise is considered to have many adventages, especially regarding financing, human resources and management, unless the brand owner’s willingness to share it whithothers by member of the franchise to pay some money to get the ringht conoperation and sale of a product, as well as selecting a highly effective distribution channels tobring products to consumers.            Processing franchise by leveraging information and communication technology is expected to encourage performance improvement and management of a franchise making it easier and more efficient in monitoring the sales report.            Applications android based mobile monitoring can facilitate franchise agent to supervise the sale of goods to see report data residing on the mobile web server and the data displayed in bar graph form.Keyword:   Franchise,  Mobile Monitoring,  Android
SISTEM PAKAR REKOMENDASI PEMINJAMAN BUKU DI PERPUSTAKAAN SEKOLAH TINGGI TEKNOLOGI ADISUTJIPTO YOGYAKARTA DENGAN METODE PENYARINGAN KOLABORATIF Hasibuan, Piniel Romulia; Honggowibowo, Anton Setiawan; Wintolo, Hero
Compiler Vol 1, No 1 (2012): Mei
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (526.634 KB)

Abstract

Library of Sekolah Tinggi Teknologi “Adisutjipto” Yogyakarta has developed rapidly according to the world development and the increasing number of library members and book collections that are owned by the library. The billing system which is running now is able to serve books borrowing and returning services to the members, but is unable to provide an alternative book recommendation according to a certain book borrowed by a member. Book Recommendation Expert System for Library of Sekolah Tinggi Teknologi “Adisutjipto” Yogyakarta with collaborative filtering method uses historic book borrowing data, building, and maintaining profiles of the members of library based on the major taken by the member and the favourite reading topic of each member in order to provide some alternatives when a member borrow a book. After passing the test period, this system is claimed effective to be used in the library, make the library service become more efficient in providing alternative book recommendations, and is able to provide user satisfied alternative book recommendations.
SINKRONISASI TABEL BERBASIS RECORD MENGGUNAKAN SISTEM KEAMANAN AUTHENTICATION, AUTHORIZATION, ACCOUNTING (AAA) (STUDI KASUS DI STTA YOGYAKARTA) Suwito, Suwito; Wintolo, Hero; Nugraheny, Dwi
Compiler Vol 1, No 2 (2012): November
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (198.712 KB)

Abstract

Synchronization is the process of setting the course of several processes at the same time. Synchronization builds upon students' academic value table STTA Yogyakarta by comparing records for the records in the database. If there is a difference in the academic value of the table the different values will be returned as the value of the original with comparing by using the master database. Record based table synchronization is expected to address the security system on the database and provide security guarantees a safe and comfortable.Authentication is a process by which a user is identified by the server before the user using the network. In the process, the user is requesting access rights to the server to use a network. Authorization is the allocation of what services are entitled to be accessed by the user on the network. Authorization is done when the user has been declared eligible to use the network. Accounting is a process performed by the server to record all user activity in the network, such as when the user starts using the network, end user when the connection to the network, how long the user using the network, how much data is accessed from the network user.The results of the implementation of synchronization using a table based record system security authentication, authorization, accounting changes that may prevent the occurrence of data in a database, optimizing the use of stored, and enhance security systems at the database STTA center of Yogyakarta.
PENERAPAN PEMROSESAN PARALEL UNTUK MENGUJI WAKTU RENDERING DESIGN WEB DENGAN FRAMEWORK TERHADAP PROCESSOR MELALUI LAN, ROUTER DAN EKSTRANET Ngadiyono, Ngadiyono; Wintolo, Hero
Compiler Vol 4, No 1 (2015): Mei
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (154.777 KB)

Abstract

Designing a website is the first step to build website that gives the appearance of an interface to the website visitor. the appearence web design that interesting can be gived conveniences for visitors to browse the contents of any website content. designing of the website, skill are required several to be master multiple web programming languages, the programming language are  HTML, CSS and Javascript. In the overall control of the programming language takes time to be master and understand each other codes. Therefore, to built application that allows users to create a website design. This application is called WebEditor is built using CodeIgniter and Twitter Bootstrap framework. In the rendering process design needed parallel processing techniques to the process. so, the impact in terms of rendering time speed to website design. Throughout this system, users can design a website easily and quickly, and in the process of rendering design does not require for long time. the results of study case have done that it can be seen that influences of the implementation of rendering speed transmission media based on the number of processors and computers server. The percentage of the speed to rendering of design does not using a grid server on the LAN network are 33.7 %, 33.3 % and internet routers 33 %. While using a part of grid servers on the LAN network are 33.6 %, 33.4 % and internet routers 33 % and the final grid using 2 servers on the LAN network are 44 %, 33 % and internet routers 26 %. So the highest rendering speed on the LAN router network for further 44 % and 30 % at the latest on the Internet 26 % by using 2 part of grid servers. Thus rendering the best in the website design is using LAN with 2 part of grid servers.
PENERAPAN SEO (SEARCH ENGINE OPTIMIZATION) MENGGUNAKAN TEKNIK TOGETHER IN A SINGLE CONNECTION (TSC) DALAM MENINGKATKAN KUNJUNGAN PADA SEBUAH BLOG Setyaningsih, Devia Tito; Wintolo, Hero; Nugraheny, Dwi
Compiler Vol 1, No 2 (2012): November
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (243.293 KB)

Abstract

One of the internet service used by the people of Indonesia is a blog that can be accessed via http://blogspot.com or http://wordpress.com and others. Everyone can use this medium for the purpose of publication of information in the form of text, images, sounds, or video without having to master web programming languages. One of the obstacles a person who has a blog is a way of increasing number of visitors to his blog. In order for many visitors the blog owner needs to understand about SEO (Search Engine Optimization).To allow users to blog in increasing the number of visitors and ranking his blog, they invented a system that utilizes parallel processing techniques and create a new method, named TSC (Together in a Single Connection) to increase the number of visitors, number of pages viewed and ranking.Increase blog traffic system based on parallel processing can improve the effectiveness in increasing traffic to a blog. With this system the blog owner is expected to be easier to rise to visit his blog.
ANALISA PERBANDINGAN WAKTU DAN KECEPATAN TRANSFER PADA MULTI PROTOCOL LABEL SWITCHING (MPLS) DENGAN VIRTUAL PRIVATE NETWORK (VPN) UNTUK PERPINDAHAN DOKUMEN PADA JARINGAN KOMPUTER Saleh, Ibrahim; Wintolo, Hero; Nugraheny, Dwi
Compiler Vol 3, No 1 (2014): Mei
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (189.009 KB)

Abstract

MPLS (Multi Protocol Label Switching) technology has been developed and mostly used by the service provider on their main network. Data packets which forwarded from one router to another router can also use VPN (Virtual Private Network) technology. VPNs were developed in the field of computer networks now have many variants, such as MPLS VPN and VPN which connects between computers or a LAN through a public network is the internet. The purpose of this final task is build a lab scale VPN network with MPLS technology use Mikrotik router RB 750GL and create a VPN connection to the STTA campus network passing the public internet. Then do a comparative analysis of the time required and the speed of transfer on both the network. The results of a comparative analysis between MPLS and VPN with the same file capacity, it appears that the MPLS network is faster in time speed and transfer speed
ALGORITMA RANDOM PADA COMPUTER BASED TEST PENERIMAAN MAHASISWA BARU STTA YOGYAKARTA Bahri, Saiful; Wintolo, Hero; Honggowibowo, Anton Setiawan
Compiler Vol 1, No 2 (2012): November
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (129.893 KB)

Abstract

The Admissions  in the College of Technology Adisutjipto Yogyakarta, the committee has had PMB Computer Based Test (CBT) to test new students since 2010. However, CBT is owned by STTA not support randomization and answer questions about each exam so issued, the order of questions and answers will remain the same. Of the many random algorithm, algorithm Congruential Linear Generators (LCG) is an algorithm suitable for use in scrambling about in CBT because of the rapid process of generating random numbers and the algorithm is easy to learn and implement. By giving feedback LCG a current value of the length of time it will produce a different value in each random from the first randomization. With randomness about the cheating in the exam PMB can be resolved.
Co-Authors . Sudaryanto Addiwinoto, Gunawan Aditya Wisnu Pratama Aditya, Reza Aditya, Reza Aji, Bimio Wahyu Alriavindra Funny, Rindu Amalia Farhati Aminuyati Anggaraini Kusumaningrum Anggit Tri Widiastuti Anggit Tri Widiastuti, Anggit Tri Anggraini Kusumaningrum Anggraini Kusumaningrum Anggraini Kusumaningrum, Anggraini Anton Setiawan Honggowibowo Anton Setiawan Honggowibowo Anton Setiawan Honggowibowo Anton Yudhana Arief Dwi Nugroho ARIF HIDAYATULLAH Arwin Datumaya Wahyudi Sumari Astika Ayuningtyas Astika AyuningTyas, Astika Astuti, Ellyana Mega Dewantri Bambang Sudibya Bambang Sudibya, Bambang Basuki Nugroho Susanto Basuki Nugroho Susanto, Basuki Nugroho Bimio Wahyu Aji Chris Tri Widyarto Christoporus Galih Pramudito Deny Hp., Fathul Fata Derry Purnamasari Derry Purnamasari, Derry Devia Tito Setyaningsih Dwi Nugrahenny Dwi Nugrahenny, Dwi Dwi Nugraheny Dwi Nugraheny Dwi Nugraheny Dwi Nugraheny, Dwi Dwi Paradita, Lalu Septian Emy Setyaningsih Evi Wahyuningsih Eviana Yulianti Saputri Fathul Fata Deny Hp. Fera Suprapti Friska Ayu Dhawara Galih Andita Sukma Gilang Wiratmaja Gregorius Ferdian F.D.Setyawan Gunawan Addiwinoto Habib Satrio Atmojo Handoko Widya Kusuma Harliyus Agustian HARLIYUS AGUSTIAN Haruno Sajati Hasibuan, Piniel Romulia Ibrahim Saleh Ibrahim, Andi Ahmad Iswar Ida Ayu Putu Sri Widnyani Imam Riadi Irawaty, Mardiana Khairur Razikin Lalu Septian Dwi Paradita Lalu Suwandi Yusuf Moh.Bambang Haryo Seto Muhamad Hafish Muhammad Imam, Muhammad Muhammad Rivai Ngadiyono Ngadiyono, Ngadiyono Nurcahyani Dewi Retnowati Nurcahyani Dewi Retnowati Nuryatno, Edi Triono Omara, Safik Piniel Romulia Hasibuan Pradana Nur Prasetya Pramudito, Christoporus Galih Prasetya, Pradana Nur Prasetyo Fendriyanto, Prasetyo Pratama, Aditya Wisnu Prayogi, Yogi Priyo Pujiastuti, Asih Qurniawan, Wawan Razikin, Khairur Rivcky Septianto RIYAN ANDRIYANTO Safik Omara Saiful Bahri Salam Aryanto Saleh, Ibrahim Septianto, Rivcky Setyaningsih, Devia Tito Setyoadi, Wangsit Sri Mulyani Sudaryanto Sudaryanto Suhirman Sukma, Galih Andita Sumarsono Sumarsono Sumarsono Sumarsono Suprapti, Fera SUWITO SUWITO Suwito Suwito Syafrudin Abdie Triono Nuryatno, Edi Wahyu Hamdani Wangsit Setyoadi Wawan Qurniawan Widyarto, Chris Tri Wiratmaja, Gilang Wiwik Handayani Yenni Astuti Yenni Astuti, Yenni Yogi Priyo Prayogi Yuliani Indrianingsih Yuliani Indrianingsih Yuliani Indrianingsih Yuliani Indrianingsih Yuliani Indrianingsih Yusuf, Lalu Suwandi Zulham Zulham Zuliana Zuliana Zuliana, Zuliana