Claim Missing Document
Check
Articles

PERANCANGAN WEB FRANCHISE PEMPEK DAN MOBILE MONITORING BERBASIS ANDROID Fera Suprapti; Hero Wintolo; Anton Setiawan Honggowibowo
Compiler Vol 1, No 1 (2012): Mei
Publisher : Institut Teknologi Dirgantara Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (542.845 KB) | DOI: 10.28989/compiler.v1i1.3

Abstract

Franchising is essentially a marketing concept in order to expand the network of one way that is as strong just a conventional marketing strategy in developing the business franchise is considered to have many adventages, especially regarding financing, human resources and management, unless the brand owner’s willingness to share it whithothers by member of the franchise to pay some money to get the ringht conoperation and sale of a product, as well as selecting a highly effective distribution channels tobring products to consumers.            Processing franchise by leveraging information and communication technology is expected to encourage performance improvement and management of a franchise making it easier and more efficient in monitoring the sales report.            Applications android based mobile monitoring can facilitate franchise agent to supervise the sale of goods to see report data residing on the mobile web server and the data displayed in bar graph form.Keyword:   Franchise,  Mobile Monitoring,  Android
IMPLEMENTASI LOAD BALANCING BERBASIS CLOUD COMPUTING UNTUK MENDUKUNG INFRASTRUCTURE AS A SERVICE MENGGUNAKAN METODE QUICK SORT Hero Wintolo; Lalu Suwandi Yusuf
Compiler Vol 7, No 1 (2018): May
Publisher : Institut Teknologi Dirgantara Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (936.353 KB) | DOI: 10.28989/compiler.v7i1.260

Abstract

Implementation of load balancing in cloud computing applications using quick sort method is a study to determine the access speed of each server. Design a cloud computing application using 4 laptops as application users and 3 laptops or PCs as servers in data storage. In sending data performed by the user application, the data will be distributed to the server that has been selected by the system with a quick sort method that sort the rest of the server capacity and then choose the server with the largest capacity. The stored data is placed in the htdocs file on the server. Based on the tests performed, cloud computing applications can run on at least 2 laptops using the windows version. Testing the server is also done by directly using the command prompt. During testing each server receives ping from the application to determine server performance in using load balancing. Testing without load balancing that sends data 50 times of 10 Mb to one server yields speed 15 ms, with 2 server divided by two in its data delivery that is as much as 25 times 10 Mb then speed 12 ms.
PEMANFAATAN DIRECTION API ( APPLICATION PROGRAMMING INTERFACE ) PADA LAYANAN GOOGLE MAP UNTUK PENCARIAN RUMAH IBADAH DI KOTAMADYA YOGYAKARTA PADA HANDPHONE BERBASIS ANDROID Gunawan Addiwinoto; Hero Wintolo; Dwi Nugraheny
Compiler Vol 1, No 2 (2012): November
Publisher : Institut Teknologi Dirgantara Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (144.038 KB) | DOI: 10.28989/compiler.v1i2.14

Abstract

Since the smartphone android as open technology was found, the Users can take some advantages from Google’s map service which is exist in the application to build the applications service. API direction can using HTTP to determine the location of the inter-view destination, mileage and road routes that can be passed either as a text string or as a latitude or longitude that can be implemented through a Google map.By using this direction google map service, API, can be used this service to create a searching application service to search the houses of worship. Besides used  for knowing generally the houses of worship that exist around the Yogyakarta city, the determination of the shortest path is needed because in this life people often travel from one place to another by considering the efficiency of time, mileage and expenses.Searching service of the houses of worship is existed in the application, it can be tested in various service providers through the internet and GPS signal strength which is optimal enough to obtain the shortest distance with the direction on the map and with a percentage accuracy of the average distance between Google on the map with the actual distance of 99%.
PENERAPAN ALGORITMA SAPA PADA JARINGAN AD-HOC UNTUK MENGIDENTIFIKASI KOMPUTER BERBASIS MAC ADDRESS Chris Tri Widyarto; Hero Wintolo; Yuliani Indrianingsih
Compiler Vol 2, No 1 (2013): Mei
Publisher : Institut Teknologi Dirgantara Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (739.772 KB) | DOI: 10.28989/compiler.v2i1.31

Abstract

Wi-Fi waves are commonly used as an intermediary in the communication relationships in the wireless network. However, the use o f Wi-Fi waves can be used in addition to getting the relationship in the network, the user is also able to detect and identify other devices by using Wi-Fi waves. Ad-hoc network is a network that can be built independently by the computer with the Microsoft Windows operating system, to enable ad-hoc device has to have an identity that is SSID, the SSID is then activate the device can be detected by other devices. Activation is done ad-hoc by the netsh command is a shell command in the Windows 7 operating system. An ID must be unique for each device as there is no dual identity, to maximize the identification process. Utilizing MAC address as an identity is used, allowing the device to be uniquely identified. In addition to the MAC address is added to the device profile in the identity o f the device for easier identification. Sapa application users can identify the device is detected, and recognize it as a co-owned devices. Scheme which is the concept o f the algorithm Sapa. Sapa application allows device activation or notebook PC with the Windows 7 operating system to be detected and detected by other devices with the Windows 7 operating system and applications are also active Sapa. Communication is established indirect communication that occurs in a single direction. Detection range can be done up to 77 meters distance.
LAYANAN CLOUD COMPUTING BERBASIS INFRASTRUCTURE AS A SERVICE MENGGUNAKAN ANDROID Hero Wintolo; Lalu Septian Dwi Paradita
Compiler Vol 4, No 2 (2015): November
Publisher : Institut Teknologi Dirgantara Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (168.669 KB) | DOI: 10.28989/compiler.v4i2.91

Abstract

Cloud computing, one form of information technologies are widely used in the field of computer networks or the Internet. Cloud computing consists of computer hardware, computer networking devices, and computer software, the cloud computing there are three services provided include (SaaS) Software as a Service (PaaS) Platform as a Service, and (IaaS) Infrastructure as a Service. Application cloud computing services in the wake of this system is a service-based data storage infrastructure as a service by using android smartphone as a storage medium, which utilizes FTP Server which is already available on the smartphone. This certainly supports the easy storage of data that utilize various types of internal and external storage on smartphones that serves as a storage server. In addition to the functions of storage available, this service can accommodate streaming function .mp3 file type. Implementation result of the system can be implemented on a local network using a wireless LAN. In addition, the results of user testing using Likert method shows the application can run and function properly
PENERAPAN SISTEM KEAMANAN DENGAN KRIPTOGRAFI ADVANCED ENCRYPTION STANDARD (AES) DAN KEY ADMINISTRATOR PADA SINKRONISASI FILE Wawan Qurniawan; Hero Wintolo; Dwi Nugraheny
Compiler Vol 1, No 2 (2012): November
Publisher : Institut Teknologi Dirgantara Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (213.077 KB) | DOI: 10.28989/compiler.v1i2.25

Abstract

File synchronization is the process of homogenization or adjustment between one file at a location with other files in the event that a change to be used up and running in a system. File synchronization is generally a process of data exchange in order to have the same amount of data. To maintain the confidentiality of the data necessary to maintain services for data security.            The use of cryptographic AES (Advanced Encryption Standard) to encrypt the file and combined with the administrator as an authentication key in making additions or changes to the file is a security system that can be applied to synchronize the files so that data confidentiality will be maintained.            The results of the implementation of file synchronization application by applying the AES cryptography and key administrators who carried on the local network and the Internet as a service application data synchronization between the user and the service back-up data as manual handling if storage was damaged and can avoid the theft of data from a file synchronized.
PENERAPAN SISTEM TERDISTRIBUSI PADA TOGETHER IN A SINGLE CONNECTION (TSC) BERBASIS WEB Zuliana Zuliana; Hero Wintolo; Bambang Sudibya
Compiler Vol 2, No 2 (2013): November
Publisher : Institut Teknologi Dirgantara Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (142.647 KB) | DOI: 10.28989/compiler.v2i2.58

Abstract

Distributed system is a computer networking technology which can be hardware or software. In hardware distributed system by a collection of computers that are heterogeneous, being in the software system is distributed in the form of software that connects two applications in the form of client and server side. TSC method is a method that already existed before, which can be used increase the ranking o f a blog. Implementation distributed system for TSC using landing page as the intermediary. Landing page serves as a liaison between web applications or blogs are listed as a member to raise the ranking of a database on the application server side. When someone does click on landing page seoindonesia, will open a blog or other web members. Landing page so it can be used as a way to count the number of visitors to a blog or website, which in turn can increase the number o f page visits and 1 with 1 clickbutton seoindonesia for test in histats.com.
KUALITAS RUNNING TEXT DALAM PEMBERIAN INFORMASI DI LINGKUNGAN KAMPUS SEKOLAH TINGGI TEKNOLOGI ADISUTJIPTO YOGYAKARTA Rivcky Septianto; Sumarsono Sumarsono; Hero Wintolo
Compiler Vol 1, No 2 (2012): November
Publisher : Institut Teknologi Dirgantara Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (223.035 KB) | DOI: 10.28989/compiler.v1i2.20

Abstract

Requirement about lectures information quickly, easily, accuratelly, and cheaply. To support lectures activity, such as lectures information scedules, lectures changed scedules, and the other informations based on running text with SMS Gateway in one way. In order to increase labor produktivity, data services, and information and increase computer skills in campus suroundings or college, that needs to be pursued in service enhancement effectively and efficiently, using information technology with running text based.In this application contains four interfaces, such as server application view, client application view, wireless fidelity (login hotspot) view, web view. Database design is a effort to make model of data management is still first draft. This database will be use to store data from the application.The result of whole research that can be analyze the test simulation is about mechanics work process from system over all. On the whole analyze result consist of the basic concept that built to become a system which has been discussed on the previous chapter.
ANALISA PERBANDINGAN WAKTU DAN KECEPATAN TRANSFER PADA MULTI PROTOCOL LABEL SWITCHING (MPLS) DENGAN VIRTUAL PRIVATE NETWORK (VPN) UNTUK PERPINDAHAN DOKUMEN PADA JARINGAN KOMPUTER Ibrahim Saleh; Hero Wintolo; Dwi Nugraheny
Compiler Vol 3, No 1 (2014): Mei
Publisher : Institut Teknologi Dirgantara Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (189.009 KB) | DOI: 10.28989/compiler.v3i1.70

Abstract

MPLS (Multi Protocol Label Switching) technology has been developed and mostly used by the service provider on their main network. Data packets which forwarded from one router to another router can also use VPN (Virtual Private Network) technology. VPNs were developed in the field of computer networks now have many variants, such as MPLS VPN and VPN which connects between computers or a LAN through a public network is the internet. The purpose of this final task is build a lab scale VPN network with MPLS technology use Mikrotik router RB 750GL and create a VPN connection to the STTA campus network passing the public internet. Then do a comparative analysis of the time required and the speed of transfer on both the network. The results of a comparative analysis between MPLS and VPN with the same file capacity, it appears that the MPLS network is faster in time speed and transfer speed
KONFIGURASI INTER-VLAN PADA CISCO BERBASIS GRAPHICS USER INTERFACE (GUI) SEBAGAI PEMBELAJARAN PERALATAN JARINGAN KOMPUTER CISCO Aditya Wisnu Pratama; Hero Wintolo; Yenni Astuti
Compiler Vol 2, No 2 (2013): November
Publisher : Institut Teknologi Dirgantara Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (145.459 KB) | DOI: 10.28989/compiler.v2i2.207

Abstract

Computer network using LAN has limitations in terms of the large number of computers that will be connected to the switch equipment. This limitation can be overcome by connecting the LAN between each other using a router. Networks inter LAN still pose a problem in terms of safety, although the amount can be overcome. To overcome the problem requires a LAN in a small group that is often known as Virtual Local Area Network (VLAN). VLAN can be connected as is often done on the LAN in general with the addition of some equipment that is able to be used as the connecting or known by the name of inter-VLAN. inter-VLAN configuration can be done directly and indirectly. the configuration directly by configuring the network equipment such as switches and routers, while the indirect configuration can be done using packet tracer. In doing inter-VLAN configuration requires a command performed by an administrator. Commands that is configured on the network equipment is a command that is still a command line or a particular script. For people who have not worked as a network administrator needed a software Graphics User Interface (GUI) for ease in studying network administration. Software Graphics User Interface (GUI) can facilitate a person who has worked as an administrator to configure inter-VLAN.
Co-Authors . Sudaryanto Abdul Fadlil Addiwinoto, Gunawan Aditya Wisnu Pratama Aditya, Reza Aditya, Reza Agustian, Harliyus Aji, Bimio Wahyu Alriavindra Funny, Rindu Amalia Farhati Aminuyati Anggit Tri Widiastuti Anggit Tri Widiastuti, Anggit Tri Anggraini Kusumaningrum Anggraini Kusumaningrum Anggraini Kusumaningrum, Anggraini Anton Setiawan Honggowibowo Anton Yudhana Arief Dwi Nugroho ARIF HIDAYATULLAH Aris Rakhmadi Arwin Datumaya Wahyudi Sumari Astika Ayuningtyas Astika AyuningTyas, Astika Astuti, Ellyana Mega Dewantri Bambang Sudibya Bambang Sudibya, Bambang Basuki Nugroho Susanto Basuki Nugroho Susanto, Basuki Nugroho Bimio Wahyu Aji Chris Tri Widyarto Christoporus Galih Pramudito Deny Hp., Fathul Fata Derry Purnamasari Derry Purnamasari, Derry Devia Tito Setyaningsih Dewi Retnowati, Nurcahyani Dewi Soyusiawaty Dwi Nugrahenny Dwi Nugrahenny, Dwi Dwi Nugraheny Dwi Nugraheny Dwi Nugraheny, Dwi Dwi Paradita, Lalu Septian Emy Setyaningsih Evi Wahyuningsih Eviana Yulianti Saputri Fathul Fata Deny Hp. Fera Suprapti Friska Ayu Dhawara Galih Andita Sukma Gilang Wiratmaja Gregorius Ferdian F.D.Setyawan Gunawan Addiwinoto Habib Satrio Atmojo Handoko Widya Kusuma HARLIYUS AGUSTIAN Haruno Sajati Hasibuan, Piniel Romulia Ibrahim Saleh Ibrahim, Andi Ahmad Iswar Ida Ayu Putu Sri Widnyani Imam Riadi Irawaty, Mardiana Khairur Razikin Kusumaningrum, Anggaraini Lalu Septian Dwi Paradita Lalu Suwandi Yusuf Muhamad Hafish Muhammad Imam, Muhammad Muhammad Rivai Ngadiyono Ngadiyono, Ngadiyono Nurcahyani Dewi Retnowati Nuryatno, Edi Triono Omara, Safik Piniel Romulia Hasibuan Pradana Nur Prasetya Pramudito, Christoporus Galih Prasetya, Pradana Nur Prasetyo Fendriyanto, Prasetyo Pratama, Aditya Wisnu Prayogi, Yogi Priyo Pujiastuti, Asih Putri Silmina, Esi Qurniawan, Wawan Razikin, Khairur Rivcky Septianto RIYAN ANDRIYANTO Safik Omara Saiful Bahri Salam Aryanto Saleh, Ibrahim Saputri, Eviana Yulianti Septianto, Rivcky Setiawan Honggowibowo, Anton Seto, Moh.Bambang Haryo Setyaningsih, Devia Tito Setyoadi, Wangsit Sri Mulyani Sudaryanto Sudaryanto SUDARYANTO SUDARYANTO Suhirman Sukma, Galih Andita Sumarsono Sumarsono Sumarsono Sumarsono Sunardi Suprapti, Fera SUWITO SUWITO Suwito Suwito Syafrudin Abdie Triono Nuryatno, Edi Wahyu Hamdani Wangsit Setyoadi Wawan Qurniawan Widyarto, Chris Tri Wiratmaja, Gilang Wiwik Handayani Yenni Astuti Yenni Astuti, Yenni Yogi Priyo Prayogi Yuliani Indrianingsih Yuliani Indrianingsih Yuliani Indrianingsih Yuliani Indrianingsih Yuliani Indrianingsih Yusuf, Lalu Suwandi Zulham Zulham Zuliana Zuliana Zuliana, Zuliana