Compiler
Jurnal "COMPILER" dengan ISSN Cetak : 2252-3839 dan ISSN On Line 2549-2403 adalah jurnal yang diterbitkan oleh Departement Informatika Sekolah Tinggi Teknologi Adisutjipto Yogyakarta. Jurnal ini memuat artikel yang merupakan hasil-hasil penelitian dengan bidang kajian Struktur Diskrit, Ilmu Komputasi , Algoritma dan Kompleksitas, Bahasa Pemrograman, Sistem Cerdas, Rekayasa Perangkat Lunak, Manajemen Informasi, Dasar-dasar Pengembangan Perangkat Lunak, Interaksi Manusia-Komputer, Pengembangan Berbasis Platform, Arsitektur dan Organisasi Komputer, Sistem Operasi, Dasar-dasar Sistem,Penjaminan dan Keamanan Informasi, Grafis dan Visualisasi, Komputasi Paralel dan Terdistribusi, Jaringan dan Komunikasi, Desain, Animasi dan Simulasi Pesawat Terbang. Compiler terbit setiap bulan Mei dan November.
Articles
22 Documents
Search results for
, issue
"Vol 8, No 2 (2019): November"
:
22 Documents
clear
VLAN Wireless Performance Analysis Of Central Access Point Management Topology According to the IEEE 802.11 Standard
Wicaksono, Arief Ikhwan;
Setiawan, Chanief Budi
Compiler Vol 8, No 2 (2019): November
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (941.493 KB)
|
DOI: 10.28989/compiler.v8i2.525
Wireless network distribution is the right solution to disseminate network services in places and areas that are difficult to reach by cable networks. The effort to add a number of access points is intended to increase the coverage area of a network service so that the signal coverage can be even and broad. The development and improvement of wireless network users have made management and user management activities not easy, because of the way wireless technology works in the operational delivery of its packages, sorting and dividing the packages into 3 parts. Among them are packaged in the form of management, control, and data. Whereas if the management prioritizes data without considering management and control, the emergence of vulnerability in network distribution activities will occur when users are increasingly populated. To facilitate the flexibility and mobility of centralized wireless network users, this study utilizes VLANs that will be implemented at OSI Layer 2 to facilitate the classification of user-profiles, subnetting, securing, and roaming features between access point devices and their users. This research in its testing uses QoS parameters that refer to ITU G.165 / G.168 to monitor the quality of services provided. The parameters used in the measurement of interconnection include Throughput, Packet Loss Ratio, Latency, Jitter, and Delay. If the test is declared successful and complete, it is continued by analyzing and evaluating the results of the study in the hope that the system will successfully cluster the users based on the user characteristic datasetÂ
Performance Analysis of Illumination Invariant Change Detection Method for Detecting Image Change in Night Vision Camera
Priadana, Adri
Compiler Vol 8, No 2 (2019): November
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1054.897 KB)
|
DOI: 10.28989/compiler.v8i2.514
At present, the use of video cameras is not only limited to documenting events but is also used for surveillance systems. Changes in lighting that occur in the surveillance area is one of the problems that result in a false alarm on the surveillance system. Illumination Invariant Change Detection is a method for detecting image changes on images. This study aims to determine the performance of the Illumination Invariant Change Detection method to detect image changes in night vision surveillance cameras. The Illumination Invariant Change Detection method does not work well for detecting image changes on a night vision camera under dark lighting conditions at an average value of Lux 0 with an infrared lamp on. The accuracy of the application of the method to detect image changes on night vision cameras is 80% with the selection of the threshold value of the detection of image changes that is 75000 pixels.
Designing a Management Information System Prototype for a Philanthropic Organization: a Case Study of YAAB Orbit Yogya
Kusumaningrum, Sita Dewi;
Setiaji, Hari;
Maulana, Wildan
Compiler Vol 8, No 2 (2019): November
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1179.257 KB)
|
DOI: 10.28989/compiler.v8i2.532
Modern philanthropic organizations are responsible for the use of social resources. However, some of them are facing several managerial issues, including inadequate database management and lack of accountability. To support the documenting process and to improve the management of funds, these organizations need a computer-based information management. This qualitative action research using prototyping method aimed at designing a management information system for a philanthropic organization which focus on providing education access for disadvantaged students in Yogyakarta. The process of designing management information system in the case study was applying a prototyping method since not every organization including a philanthropic organization could explicitly define the information needed to support their business process. This prototype was designed based on organization?s requirements so that users can obtain any information needed easily. The management information system prototype could provide assistance for a philanthropic organization in managing and documenting all activities in the organization.
Combination of XOR Binary Algorithm and Steganography Using Least Significant Bit (LSB) Method for Data Security
Tetik, Yulius Nahak;
Neno, Friden Elefri;
Ariyus, Dony
Compiler Vol 8, No 2 (2019): November
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1045.233 KB)
|
DOI: 10.28989/compiler.v8i2.471
Along with the development of technology and information today, data security is a problem that needs to be done to maintain the confidentiality of data or information both personally and within an organization. Cryptography is one of the sciences or arts that learns about how to secure data or information from irresponsible parties who want to destroy important data in the form of text and image files. This research, data security technique uses two algorithms, namely steganography to enter text in image media using LSB (Least Significant Bit) method and Binary XOR used to convert messages to binary with XOR keywords and generate pixel values of messages from 8 bits of images with LSB (Least Significant Bit). After encrypted the image will be sent to the user, and to view the original data, the user must decrypt the data with the message key and retrieve the LSB (Least Significant Bit) value, from the encrypted image.
Water Resources Mapping for Firefighters in Kotamadya Yogyakarta Based on Android
Indrianingsih, Yuliani;
Sajati, Haruno;
Sugara, Bayu
Compiler Vol 8, No 2 (2019): November
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (403.393 KB)
|
DOI: 10.28989/compiler.v8i2.519
Fire extinguishing system in placing reservoirs there are still many officers who do not know the location so that they can implement computerized technology so that firefighters can work to maximize the information technology made by the author well. Mobile-based reservoir mapping system application developed using Geofence method. The main purpose for this application that officers can easily find the location of the reservoir closest to the location of the fire and where officers can also find out the location of the reservoir distance from the fire. The accuracy of testing results with Google maps where the accuracy is very precise to the location of the water source or reservoir. Testing using a smartphone comparison from Android 4.1 Jelly Bean version to Android 7.0 Nougat can run with distance results in the application using google maps, get the same results and where there is a test version of Android V4.4 Kitkat that did not work because RAM does not support this application. Testing in the form of a black box method where this method tests every function contained and the test is functioning and running as smoothly as possible where the system is functioning properly with success rate 100%.
Analysis of Combination Knowledge Acquisition of Haar Training for Object Detection on the Viola Jones Method
Sajati, Haruno;
Kusumaningrum, Anggraini;
Hanifah, Nur
Compiler Vol 8, No 2 (2019): November
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (834.874 KB)
|
DOI: 10.28989/compiler.v8i2.538
Viola Jones method uses the file classifier to object detection. The training process to create object classifier file requires very high computer resources and time which is directly proportional to the amount of training data. The amount of training data determines the accuracy of object detection. The long training process is caused because the computer has low specifications and the distribution of Haartraining files will speed up the process of vector file formation, minimize errors when cutting Haar features on positive objects and also minimize errors that occur during the training process. The problems that arise next are how to overcome this so that a better knowledge is obtained. This study provides analysis results of the process of merging knowledge acquisition and its effect on the accuracy of object detection using the Viola-Jones method with the final result undetected object decrease 52.62% and object detected increase 23.78%
GPU Accelerated Fuzzy C-Means (FCM) Color Image Segmentation
Akbar, Mutaqin;
Witanti, Arita;
Susilawati, Indah
Compiler Vol 8, No 2 (2019): November
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (477.913 KB)
|
DOI: 10.28989/compiler.v8i2.455
In this paper, computational acceleration of color image segmentation using fuzzy c-means (FCM) algorithm has been presented. The color image is first converted from the Red Green Blue (RGB) color space to the YUV color space. Then, the luma (Y) information values are grouped according to the desired number of clusters using the FCM algorithm. The FCM algorithm is implemented on a Graphical Processing Unit (GPU) using the Compute Unified Device Library (CUDA) library which is developed by NVidia to speed up the computing time. Images used in this research are red blood cell images, geometry images and leaf images. The results of segmented images processed using GPU were seen identic to the results of segmented images processed using the Central Processing Unit (CPU). The computational time of the FCM algorithm can be accelerated by speed-up to 5,628 times faster and the average speed-up of all simulations done is 5,517 times faster.
Simulator Modules for Learning Maintenance of Avionics Components in Solid State Cockpit Voice Recorder (SSCVR) PN. 980-6022-001 and Aircraft Battery PN. 405CH
Saputri, Dwinny Puspa Dinar;
Nugraheny, Dwi
Compiler Vol 8, No 2 (2019): November
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (791.006 KB)
|
DOI: 10.28989/compiler.v8i2.521
PT GMF AeroAsia Tbk is an international company that provides the largest maintenance facilities and services in Asia. The divisions in PT GMF AeroAsia Tbk one of which is the Avionics Shop division, where the division is a part that performs maintenance of avionics components such as Solid State Cockpit Voice Recorder (SSCVR), Flight Data Recorder (FDR), Aircraft Battery and all other electronic components that is in the plane. At the Avionics Shop at PT GMF AeroAsia Tbk for the maintenance training needs of the avionics component, a simulator is needed as a learning media about the process of introducing, assembling and dismantling a PN Solid State Cockpit Voice Recorder (SSCVR) component. 980-6022-001 and Aircraft Battery PN. 405CH. The simulator is built using Unity 3D and asset modeling using Blender. The results of the functionality test state that the simulator can run well according to its function. The results of the due diligence obtained an average value of 90.4 which is included in the category of "Very Good" and stated that the simulator has met the needs that underlie the design of the simulator, meets the needs of all interested parties, and can be run well on several different platforms.
Modification of Vigenere Algorithm and One Time Pad Using Rivest Code 6 (RC6) Key Expansion
Budiman, Arif;
Paradise, Paradise
Compiler Vol 8, No 2 (2019): November
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (835.138 KB)
|
DOI: 10.28989/compiler.v8i2.481
Information technology that is increasingly developing today must be balanced with the similarity of information data. Information security is obtained by applying cryptographic techniques, Vigenere Cipher is a key symmetry algorithm that uses a substitution technique that uses two letters encoding the original message. Vigenere cipher has a weakness because it uses short keywords and its use will be repeated. In this study, we will discuss the modification of the vigenere cipher algorithm and one time pad by adding a key elongation process as done in the RC6 algorithm. The results of the study will produce new variations in data security by combining the vigenere cipher algorithm and vernam cipher with key expansion algorithm RC6
Three-Dimensional Flight Simulator Takeoff Movement on Boeing 737-300 Aircraft
Irfan, Muhammad;
Retnowati, Nurcahyani Dewi;
Adiputra, Bangga Dirgantara
Compiler Vol 8, No 2 (2019): November
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (771.868 KB)
|
DOI: 10.28989/compiler.v8i2.523
The simulator is a form of imitation of conditions describing a behavior in conformity with the reality in which there is an interaction between the user and the simulation. Simulators are very useful for simulating events that can help the teaching and learning system. The result of this final project is a 3D take off simulator on a desktop-based Boeing 737-300 that serves as a training aid and contains an explanation of Boeing 737-300 take off information. This simulator provides ideal data in the form of weight, take off speed, flap settings and distance data to understand the aircraft performing the V1, VR and V2 processes. The research methods carried out include modeling a Boeing 737-300 aircraft using blueprint, asset modeling, and texturing using Blender 3D software then proceed with the design of simulations using Unity software. Simulation tests include black box testing. The results of the black box testing indicate that all functions of the simulator run according to the Windows 7, Windows 8, and Windows 10 operating system with a 64-bit system. Flight simulator is functioning properly and can show information on the movements and conditions od the aircraft in taking flight in the takeoff phase with weight conditions, the speed at which the aircraft drove on the runway, wind pressure conditions on the runway and flaps that will be arranged in this flight simulator.