cover
Contact Name
Hero Wintolo
Contact Email
herowintolo@stta.ac.id
Phone
-
Journal Mail Official
informatika@stta.ac.id
Editorial Address
-
Location
Kab. bantul,
Daerah istimewa yogyakarta
INDONESIA
Compiler
ISSN : 22523839     EISSN : 25492403     DOI : 10.28989/compiler
Core Subject : Science,
Jurnal "COMPILER" dengan ISSN Cetak : 2252-3839 dan ISSN On Line 2549-2403 adalah jurnal yang diterbitkan oleh Departement Informatika Sekolah Tinggi Teknologi Adisutjipto Yogyakarta. Jurnal ini memuat artikel yang merupakan hasil-hasil penelitian dengan bidang kajian Struktur Diskrit, Ilmu Komputasi , Algoritma dan Kompleksitas, Bahasa Pemrograman, Sistem Cerdas, Rekayasa Perangkat Lunak, Manajemen Informasi, Dasar-dasar Pengembangan Perangkat Lunak, Interaksi Manusia-Komputer, Pengembangan Berbasis Platform, Arsitektur dan Organisasi Komputer, Sistem Operasi, Dasar-dasar Sistem,Penjaminan dan Keamanan Informasi, Grafis dan Visualisasi, Komputasi Paralel dan Terdistribusi, Jaringan dan Komunikasi, Desain, Animasi dan Simulasi Pesawat Terbang. Compiler terbit setiap bulan Mei dan November.
Arjuna Subject : -
Articles 9 Documents
Search results for , issue "Vol 8, No 1 (2019): May" : 9 Documents clear
Django Framework and Python-Gammu as Middleware SMS Broadcast Puji Winar Cahyo; Arief Ikhwan Wicaksono
Compiler Vol 8, No 1 (2019): May
Publisher : Institut Teknologi Dirgantara Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (630.077 KB) | DOI: 10.28989/compiler.v8i1.430

Abstract

Because the growing of mobile technology in recently days, technology practitioners are required to be able to create a variety of devices and media that support the mobile technology. Application developers compete to create mobile applications that have a variety of features, including video call, voice sending, image sending or text messaging. Developing of mobile applications have an impact on using of Short Message Service, although using of Short Message Service began to shift, but the Short Message Service feature cannot be abandoned, because Short Message Service is a standard feature carried by mobile devices (mobile phones). For this reason, we need to develop Short Message Service Broadcast middleware as an intermediary for Short Message Service communication between web technology and mobile devices. This technology is using for disseminating information between systems that have been built with mobile devices via Short message service. Broadcast system will produce information about new student admissions, That will be received directly by Senior High School Students through their mobile phones. The Middleware can send message broadcast in real time to more than 500 cellular numbers automatically with an average time of 13 seconds for one message. The advantage of using this technology is direct configuration with Python Back-End. Meanwhile, Technology for message inbox still requires further configuration.
Introduction to Yogyakarta Icons in The Game of Running Challenge Angga Adha Nugroho Bonai; Dwi Nugraheny; Harliyus Agustian
Compiler Vol 8, No 1 (2019): May
Publisher : Institut Teknologi Dirgantara Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (861.546 KB) | DOI: 10.28989/compiler.v8i1.432

Abstract

Yogyakarta's strong culture makes Yogyakarta one of the tourist areas frequented by tourists, both foreign tourists and local tourists. The Visitors come from various groups, for example visitors who come with family or individuals. A game model is needed that can facilitate the child in remembering the tourist icons in Yogyakarta through a Game Running Challenge that is made as attractive as possible and can run on the Windows operating system. The game running challenge application can provide convenience to users who are children aged 6-10 years to get to know and know the most famous icons in Yogyakarta through a game. So that it can be an educational medium that has a pattern of learning by doing learning.
Uniform Resource Locator (URL) Detection Security System Based on Android Haruno Sajati; Harliyus Agustian; Eko Murdiansyah
Compiler Vol 8, No 1 (2019): May
Publisher : Institut Teknologi Dirgantara Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (613.013 KB) | DOI: 10.28989/compiler.v8i1.343

Abstract

The use of the internet, which is currently increasing dramatically, certainly brings the convenience of finding information. The increase in internet usage also eventually gave rise to cybercrime crimes, one of which was by spreading a URL or fake site to steal someone's personal data. The research done is how to build an Android-based application that can detect the security of a URL. The goal is that internet users, especially social media, can avoid cybercrime crime that wants to steal personal data. Making an application uses the Regular Expression method to analyze each line of the Webpage Source Code in the URL based on 8 criteria taken from the World Wide Web Consortium (W3C). The application was then tested with 10 phishing-charged URLs and compared with Kaspersky, McAfee, and AdBlock applications. Based on the results of trials and comparisons, applications that have been made are able to detect 6 or 60% of the 10 URLs. Kaspersky and McAfee applications can detect 70%, while AdBlock only detects 3 or 30% of 10 URLs that contain phishing.
Implementation and Performance Analysis of Private Cloud Using Openstack Swift and Rclone Candra Aditama; Adri Priadana
Compiler Vol 8, No 1 (2019): May
Publisher : Institut Teknologi Dirgantara Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1332.694 KB) | DOI: 10.28989/compiler.v8i1.428

Abstract

Many companies need a storage system that can be accessed in real time by all parts of the company. Most digital data storage methods today still use conventional methods where data is stored on an external hard disk or public cloud. Storage with external hard disk media makes accessing data difficult and has the risk of data loss when storage media is damaged. On the other hand, the storage method using public cloud requires an internet connection with large bandwidth requirements and the company still has to spend a budget on renting it. This study aims to design digital data storage methods using a private cloud that can be accessed in real time by all parts of the company without having to spend a budget on hiring a storage media and renting an internet connection with large bandwidth requirements. A private cloud was built using OpenStack Swift as an object storage service provider and Rclone as a cross-platform computer data management application. The results of this study are the creation of a private cloud that runs object storage services using Swift storage objects with relatively light and high scalability to meet the needs of storing data effectively and efficiently. A private cloud-based data storage media with relatively light and high scalability to meet data storage needs. Data storage media that can be accessed easily without having to use an internet connection with large bandwidth requirements.
Bisindo Sign Language Transliteration Using Automata Awang Hendrianto Pratomo; Oliver S. Simanjuntak; Dimas Candra Nugraha Putra
Compiler Vol 8, No 1 (2019): May
Publisher : Institut Teknologi Dirgantara Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (900.521 KB) | DOI: 10.28989/compiler.v8i1.415

Abstract

Sign Language is a language which prioritizes manual communication, body language and lip movement for communication. People who usesign language for communication aredeaf and mute people. Sign language in Indonesia is Sistem Isyarat Bahasa Indonesia (SIBI) and Bahasa Isyarat Indonesia (BISINDO). BISINDO has a unique clause pattern that isSOPA (Subject, Object, Predicate, Adverbial). The clause pattern of BISINDO is just for deaf and mute people who know and understand it. Because there are some different structures between Indonesian language and BISINDO, itis neededlearning media which can translate from Indonesian language to BISINDO. Finie State Automata (FSA) is a method which is able to recognize pattern sentence classification in Indonesian language. FSA method is NSA (Non-DetermisticFinie State Automata) that is otomata with characteristics as a state. NFA is used to give introducing structure pattern sentence in Indonesian language. Sentence pattern which is produced from NFA produces eight sentences pattern which are arranged as requisites ofBISINDO translation. The result of research which is experimented by sign language researchersas many as 90% can translate well and appropriate with BISINDO sentence pattern, 10% explain that it is not appropriate with translation of sentence pattern and sign language model. Based on the data, it can be known that media of BISINDO sign language learning based on web using method of translation automata can be used for learning media. 
Decision Support System of Keyword Selection Web Site Using Analytical Hierarchy Process (AHP) and Simple Additive Weighting (SAW) Aris Wahyu Murdiyanto
Compiler Vol 8, No 1 (2019): May
Publisher : Institut Teknologi Dirgantara Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (657.729 KB) | DOI: 10.28989/compiler.v8i1.429

Abstract

The keyword is one or a group of words used by websites to improve your visibility on search engines. The selection of keywords from the results displayed by Google's keyword planner still not match the expectations of the webmaster, so that needs to be determined the choice and order of priority keywords which will be optimized beforehand. Therefore, a system that supports webmasters in making decisions on choosing keywords that will be optimized previously for search engines is needed. The methods used in this research is Analytical Hierarchy Process (AHP) to find the weighting parameters and Simple Additive Weighting (SAW) applied to find the final value and rank. The results showed that the system is running as expected, so it can be used as a basis in support of the decision of the webmaster in determining the priority of the optimization of keywords that will be worked out with the results of the comparison between the manual system with 100%. 
Decision Support System for The Weaning of Rex Rabbit Using Simple Additive Weighting ( SAW ) Method Asih Pujiastuti; Fachrul Ardiansyah
Compiler Vol 8, No 1 (2019): May
Publisher : Institut Teknologi Dirgantara Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (725.315 KB) | DOI: 10.28989/compiler.v8i1.422

Abstract

Weaning REX rabbits child is one of the keys to success in raising or cultivating rabbits. Unsuitable weaning can result in very high mortality or mortality risks, while weaning for too long results in decreased productivity and the possible marriage of children with rabbit parent. The research done is to design and build the application of decision support system (DSS) with Simple Additive Weighting method (SAW) with 5 criteria as supporting of DSS calculation that are body weight (gram), body length (cm), still breastfeeding or not, already independent for food or not and Gender. The webased DSS application created is tested  by using the calculation system compared with research data. Based on the test of 36 rabbit children which is derived from previous research results obtained showed that the application of the DSS are built 100% the same result.
Performance Analysis of Wireless Local Area Network Using Router Tenda N-300 Catur Budi Waluyo; Alber Erik; Yenni Astuti
Compiler Vol 8, No 1 (2019): May
Publisher : Institut Teknologi Dirgantara Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (819.784 KB) | DOI: 10.28989/compiler.v8i1.424

Abstract

Today's wireless communication system is a trend for the information society. This is inseparable from communication needs with high mobility and low costs. One of them is the Wireless Local Area network with the IEEE 802.11 standard. Wireless LAN is a communication technology that uses radio wave transmission media by utilizing free space as a transmission line. The transmitted signal is strongly influenced by distance, frequency, transmitter power, receiver sensitivity, and antenna gain. A loss occurs in the process of transmitting data from the sender to the recipien. In order to no loss that occurs, it requires a good performance, and a wide coverage area. The purpose of this study is to analyze the QoS data, calculate the coverage area, receiver power, and compare the results of theoretical calculations with the measurement results. The analysis results show the average throughput for each data rate of 6 Mbps, 15 Mbps and 35 Mbps at 383.8 kbps, 328.2 kbps and 329.8 kbps. The average delay is 5.28 ms, 4.81 ms and 4.66 ms. The average packet loss is 2.83% ms, 2.66% ms and 2.16% ms. The average jitter is 0.036 ms, 0.032 ms and 0.014 ms.
System for Determining Public Health Level Using the Agglomerative Hierarchical Clustering Method Suhirman Suhirman; Hero Wintolo
Compiler Vol 8, No 1 (2019): May
Publisher : Institut Teknologi Dirgantara Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (830.053 KB) | DOI: 10.28989/compiler.v8i1.425

Abstract

Regions having higher level of welfare do not always have better indicator values than other regions having lower level of welfare. The problem is the lack of information related to the indicator values needed to determine the health level. Therefore, clustering using health data becomes necessary. Data were clustered to see the maximum or the minimum level of similarity. The clustered data were based on the similarity of four morality indicator values of the regional health level. Morality indicator values used in this research are infant mortality rate, child mortality rate, maternal mortality rate, and rough birth rate. The method used is Agglomerative Hierarchical Clustering (AHC) - Complete Linkage. Data were calculated using Euclidean Distance Equation, then Complete Linkage. Four clustered data were grouped into two clusters, healthy and/or unhealthy. The result, combining from all clusters into two large clusters to see healthy and unhealthy results.

Page 1 of 1 | Total Record : 9