Compiler
Jurnal "COMPILER" dengan ISSN Cetak : 2252-3839 dan ISSN On Line 2549-2403 adalah jurnal yang diterbitkan oleh Departement Informatika Sekolah Tinggi Teknologi Adisutjipto Yogyakarta. Jurnal ini memuat artikel yang merupakan hasil-hasil penelitian dengan bidang kajian Struktur Diskrit, Ilmu Komputasi , Algoritma dan Kompleksitas, Bahasa Pemrograman, Sistem Cerdas, Rekayasa Perangkat Lunak, Manajemen Informasi, Dasar-dasar Pengembangan Perangkat Lunak, Interaksi Manusia-Komputer, Pengembangan Berbasis Platform, Arsitektur dan Organisasi Komputer, Sistem Operasi, Dasar-dasar Sistem,Penjaminan dan Keamanan Informasi, Grafis dan Visualisasi, Komputasi Paralel dan Terdistribusi, Jaringan dan Komunikasi, Desain, Animasi dan Simulasi Pesawat Terbang. Compiler terbit setiap bulan Mei dan November.
Articles
34 Documents
Search results for
, issue
"Vol 2, No 2 (2013): November"
:
34 Documents
clear
PERANCANGAN APLIKASI VIDEO STREAMING UNTUK PEMANTAUAN AIR LAUT KETIKA TERJADI GEMPA
Irawan, Wahyu;
Dermawan, Denny;
Retnowati, Nurcahyani Dewi
Compiler Vol 2, No 2 (2013): November
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (199.103 KB)
The geographical position of Indonesia is located in an earthquake-prone area that is potentially most earthquake-tsunami, it takes a transmission medium to connect the cameramonitoring results between the sender and receiver of information or data that may provide information to the natural disasters. The transmission media can be a media streaming seawater and alarm monitoring that is connected with vibration sensor that functions as a medium for early warning of natural disasters. From the test results it can be concluded that the alarm system warning of earthquakes, able to work well as vibration sensor detects vibration. As well as video streaming process can run well on a LAN network using HTTP protocol 8080. Society as a client can access the video streaming server via the address specified by the application server.
ANALISA PERBANDINGAN BREADTH-FIRST SEARCH DAN DEPTHFIRST SEARCH PADA APLIKASI SISTEM PAKAR PENGOBATAN TRADISIONAL
Ifrisma, Irisma;
Honggowibowo, Anton Setiawan;
Retnowati, Nurcahyani Dewi
Compiler Vol 2, No 2 (2013): November
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (355.95 KB)
This research was conducted based on the need for tools for parents who have had children in determining a traditional medicine to treat illnesses suffered by children, toddlers and babies. Aids in the fo rm o f an expert system of traditional medicine. This expert system application can be run in a way that the disease name input experienced by children, toddlersand babies, then the expert system will provide information prescription medications to treat the disease. Search method used is the method of Breadth-First Search and Depth-First Search. Results of comparative analysis o f Breadth-First Search and Depth-First Search was concluded that the analysis using the Depth-First Search more quickly provide information about traditional medicine in comparison with using the method of Breadth-First Search. However, the use of the method of Breadth-First Search is superior compared with Depth-FirstSearch. This is because the method of Breadth-First Search will not find a dead end or to find a solution although it has only one solution. And if you have two solutions, the method of Breadth-First Search will find them. The test results of the application of expert system of traditional medicine in the 30 responders was 72.67%. Thus, the application of expert systemof traditional medicine by using Breadth-First Search and Depth-First S earch good.
KONFIGURASI INTER-VLAN PADA CISCO BERBASIS GRAPHICS USER INTERFACE (GUI) SEBAGAI PEMBELAJARAN PERALATAN JARINGAN KOMPUTER CISCO
Pratama, Aditya Wisnu;
Wintolo, Hero;
Astuti, Yenni
Compiler Vol 2, No 2 (2013): November
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (145.459 KB)
Computer network using LAN has limitations in terms of the large number of computers that will be connected to the switch equipment. This limitation can be overcome by connecting the LAN between each other using a router. Networks inter LAN still pose a problem in terms of safety, although the amount can be overcome. To overcome the problem requires a LAN in a small group that is often known as Virtual Local Area Network (VLAN). VLAN can be connected as is often done on the LAN in general with the addition of some equipment that is able to be used as the connecting or known by the name of inter-VLAN. inter-VLAN configuration can be done directly and indirectly. the configuration directly by configuring the network equipment such as switches and routers, while the indirect configuration can be done using packet tracer. In doing inter-VLAN configuration requires a command performed by an administrator. Commands that is configured on the network equipment is a command that is still a command line or a particular script. For people who have not worked as a network administrator needed a software Graphics User Interface (GUI) for ease in studying network administration. Software Graphics User Interface (GUI) can facilitate a person who has worked as an administrator to configure inter-VLAN.
SISTEM PENDUKUNG KEPUTUSAN PEMILIHAN KOTA TUJUAN WISATA WILAYAH JAWA BALI MENGGUNAKAN METODE AKSIDENTAL SAMPLING (STUDI KASUS DI GRAS TOUR AND TRAVEL YOGYAKARTA)
Yuniati, Ismi;
Honggowibowo, Anton Setiawan;
Indrianingsih, Yuliani
Compiler Vol 2, No 2 (2013): November
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (183.505 KB)
Tourist attraction in Indonesia is one of the natural resources to be proud. That we need an alternative build Decision Support System Application. This application shows can assist determine the potential tourist travel destination, make memorable and accordance with the characteristics potential tourists addition this application saves the time and effort find a tourist destination because it can be accessed anywhere. The final result steps by steps, the best obtained from two respondents are Afriani 105 for the city o f Yogyakarta and Damar 84 for the city o f Sukabumi. Based on these results, system is able to determine built the city as desired tourist destination and tourist characteristics.
SISTEM PENDUKUNG KEPUTUSAN PENCARIAN RESTORAN DI YOGYAKARTA SESUAI KEBUTUHAN KONSUMEN MENGGUNAKAN METODE WEIGHTED PRODUCT
Mandasari, Yofy;
Honggowibowo, Anton Setiawan;
Nugraheny, Dwi
Compiler Vol 2, No 2 (2013): November
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (166.144 KB)
Decission Support System or DSS is a system thath help managers to solve a semi-structured problem. There are techniques used to make the DSS, one of them is Fuzzy Logic Multi-Attribute Decission Making (MADM). Weighted Product is a method to solve the problems using multiplication to connect the attribute ratings, where the rating attributes must be raised first with the weight of therelevant attributes. The application results show that the system can assist the consumer in deciding the restaurant according to the criteria. In addition, this application can also shorten the time in search of existing restaurants in Yogyakarta.
PENERAPAN HIDS (HOST INTRUSION DETECTION SYSTEM) DALAM MEMBANGUN KONFIGURASI FIREWALL SECARA DINAMIK
Firdaus, Alfian;
Sajati, Haruno;
Indrianingsih, Yuliani
Compiler Vol 2, No 2 (2013): November
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (89.028 KB)
Development o f information technology and computer networks in particular its services on the one hand facilitate the work of human beings, but as the very widespread use of the internet, the security level of digital data has become more vulnerable to exploitation. The problem arises when the attacks happened on a computer network in a relatively fast, so that an administrator must always keep an eye on the computer network security. Limitations o f an administrator is exactly what underlies thecreation o f a system capable o f detecting and prevention of these attacks, so the time efficiency can be actually implemented. The system is built to prevent attacks on computer networks such as port scanning, ftp, ssh and telnet brute force. This system will analyze the number o f errors that occur on login these services, and makes a decision system if the login error exceeds the tolerance of an administrator. I f the number o f errors exceeds the tolerance, it will automatically create the firewall rules in a very short duration is one minute, so the system is able to prevent the attacks which happened in a very quick time.
LOAD BALANCING MENGGUNAKAN METODE BUBBLE SORT PADA SISTEM DATABASE DENGAN MULTI SERVER
Prayitno, Prayitno;
Basukesti, Agus;
Indrianingsih, Yuliani
Compiler Vol 2, No 2 (2013): November
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (119.177 KB)
The increasing demand for the utilize services computer networks has increased the traffic on the network. In general, the server provides service round the clock without a break, so that problems such as breakdown of communication in the network is lost that must be avoided. This cases need for a bettersystem with high performance and reliable every time. Current server technology development will be fast but the memory access speed is slower than the increase in the consumption of bandwidth. This is one o f the factors causing the bottleneck experienced of server. With the load balancing can be provide abetter solution. The concept used to provide a server has the same service. Then, the load balancing will check the CPU usage on each server. The server will perform selection based on the value of the smallest CPU Usage o f all existing servers. The application load balancing is placed before the user accessing ofserver with the object of distributing requests from the user to any of the servers that have been selected by the load balancer. Load balancing provides many benefits to systems that use it. The first, low cost, existing resources do not need to be replaced or discarded. Second, don't always need high end equipment. Third, easily developed when needed arose and a drastic decline in the quality o f service. Load balancing is also more secure, when a failure occurs on the server, load balancing application will redirect the user to the server is still available.
PERANCANGAN ALGORITMA ANGGI (AA) DENGAN MEMANFAATKAN DIFFIE-HELLMAN DAN RONALD RIVEST (RC4) UNTUK MEMBANGUN SISTEM KEAMANAN BERBASIS PORT KNOCKING
Anggi Sri Septiani Suhendar;
Haruno Sajati;
Yenni Astuti
Compiler Vol 2, No 2 (2013): November
Publisher : Institut Teknologi Dirgantara Adisutjipto
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (154.818 KB)
|
DOI: 10.28989/compiler.v2i2.47
In managing a server, an administrator takes a variety of ways for ensuring the safety and cosiness of the system. One type of threat that attack on the server is done on a port that is in an open state, thus making people who do not have access rights to perform port scanning to infiltrate into the server. One solution to cope with the attack on the port can be done by using port knocking. Port knocking is a method that can be applied to the server with the workings of such a code to unlock the safe. Port knocking is done by inserting a predetermined port sequenced to open a specific port. At the port sequenced delivery process takes an additional authentication likes keyport. Anggi algorithm (AA) is an algorithm that is built by combination o f Diffie-Hellman and RC4. The algorithm is used for encryption and descriptions a keyport from client side to the server side. In the process of sending a keyport to be modified by using the arithmetic calculation. Process of encryption and description keyport is done to prevent some attacks on the server by hackers with extracting such information after successfully breaking into a port. The results o f implementation AA algorithm on the process of port knocking can secure the delivery process o f keyport and improve the security o f server.
PENERAPAN SISTEM TERDISTRIBUSI PADA TOGETHER IN A SINGLE CONNECTION (TSC) BERBASIS WEB
Zuliana Zuliana;
Hero Wintolo;
Bambang Sudibya
Compiler Vol 2, No 2 (2013): November
Publisher : Institut Teknologi Dirgantara Adisutjipto
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (142.647 KB)
|
DOI: 10.28989/compiler.v2i2.58
Distributed system is a computer networking technology which can be hardware or software. In hardware distributed system by a collection of computers that are heterogeneous, being in the software system is distributed in the form of software that connects two applications in the form of client and server side. TSC method is a method that already existed before, which can be used increase the ranking o f a blog. Implementation distributed system for TSC using landing page as the intermediary. Landing page serves as a liaison between web applications or blogs are listed as a member to raise the ranking of a database on the application server side. When someone does click on landing page seoindonesia, will open a blog or other web members. Landing page so it can be used as a way to count the number of visitors to a blog or website, which in turn can increase the number o f page visits and 1 with 1 clickbutton seoindonesia for test in histats.com.
COMPARATIVE ANALYSIS OF XML AND JSON USING PHP APPLICATION PLATFORM WITH REPRESENTATIONAL STATE TRANSFER ( REST ) ARCHITECTURAL
Saryanto Saryanto;
Sumarsono Sumarsono;
Nurcahyani Dewi Retnowati
Compiler Vol 2, No 2 (2013): November
Publisher : Institut Teknologi Dirgantara Adisutjipto
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (186.759 KB)
|
DOI: 10.28989/compiler.v2i2.53
Data communication in the internet today is so complex as an example of the speed factor becomes very important in communicating, everyone wants fast data communication services provided in order to maximum. In relation to the application as a communication liaison with client server applications, web service using a data serialization format to transmit the data. Before the data is sent, either fromthe client to the server or vice versa, should be modified in a specific data format beforehand according to the web service is used. Types of data serialization format used in the web service such as XML and JSON. The method used for testing include data serialization method, data measurement method and data parsing method. Data serialization method is used to calculate the time serialization of data from the database to the form of XML and JSON in applications with PHP platform. Data measurement method used to measure the size of the XML and JSON data which based on many fields of data serialization process. Data parsing method is used to calculate the processing time and JSON parsing XML data. Results o f comparative analysis o f XML and JSON in PHP applications using thearchitecture Rest can be concluded that the test result o f the difference in time and time serialization and JSON parsing XML data is influenced by the number o f records, if the number of records the greater the difference in eating time data serialization and parsing the data the greater the time also itcan be concluded that the faster the process JSON serialization and parsing XML data is compared. Testing results o f the JSON data size is smaller than the size of XML. Data exchange using XML format has a size limit of up to 31456.31 KB while JSON XML exceeds the size limit. Testing results on the Internet when the number o f records up to 50,000 data when the data serialization and parsing time data can not be detected in the database.