cover
Contact Name
Hero Wintolo
Contact Email
herowintolo@stta.ac.id
Phone
-
Journal Mail Official
informatika@stta.ac.id
Editorial Address
-
Location
Kab. bantul,
Daerah istimewa yogyakarta
INDONESIA
Compiler
ISSN : 22523839     EISSN : 25492403     DOI : 10.28989/compiler
Core Subject : Science,
Jurnal "COMPILER" dengan ISSN Cetak : 2252-3839 dan ISSN On Line 2549-2403 adalah jurnal yang diterbitkan oleh Departement Informatika Sekolah Tinggi Teknologi Adisutjipto Yogyakarta. Jurnal ini memuat artikel yang merupakan hasil-hasil penelitian dengan bidang kajian Struktur Diskrit, Ilmu Komputasi , Algoritma dan Kompleksitas, Bahasa Pemrograman, Sistem Cerdas, Rekayasa Perangkat Lunak, Manajemen Informasi, Dasar-dasar Pengembangan Perangkat Lunak, Interaksi Manusia-Komputer, Pengembangan Berbasis Platform, Arsitektur dan Organisasi Komputer, Sistem Operasi, Dasar-dasar Sistem,Penjaminan dan Keamanan Informasi, Grafis dan Visualisasi, Komputasi Paralel dan Terdistribusi, Jaringan dan Komunikasi, Desain, Animasi dan Simulasi Pesawat Terbang. Compiler terbit setiap bulan Mei dan November.
Arjuna Subject : -
Articles 423 Documents
Bisindo Sign Language Transliteration Using Automata Pratomo, Awang Hendrianto; Simanjuntak, Oliver S.; Putra, Dimas Candra Nugraha
Compiler Vol 8, No 1 (2019): Mei
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (900.521 KB)

Abstract

Sign Language is a language which prioritizes manual communication, body language and lip movement for communication. People who usesign language for communication aredeaf and mute people. Sign language in Indonesia is Sistem Isyarat Bahasa Indonesia (SIBI) and Bahasa Isyarat Indonesia (BISINDO). BISINDO has a unique clause pattern that isSOPA (Subject, Object, Predicate, Adverbial). The clause pattern of BISINDO is just for deaf and mute people who know and understand it. Because there are some different structures between Indonesian language and BISINDO, itis neededlearning media which can translate from Indonesian language to BISINDO. Finie State Automata (FSA) is a method which is able to recognize pattern sentence classification in Indonesian language. FSA method is NSA (Non-DetermisticFinie State Automata) that is otomata with characteristics as a state. NFA is used to give introducing structure pattern sentence in Indonesian language. Sentence pattern which is produced from NFA produces eight sentences pattern which are arranged as requisites ofBISINDO translation. The result of research which is experimented by sign language researchersas many as 90% can translate well and appropriate with BISINDO sentence pattern, 10% explain that it is not appropriate with translation of sentence pattern and sign language model. Based on the data, it can be known that media of BISINDO sign language learning based on web using method of translation automata can be used for learning media. 
Decision Support System of Keyword Selection Web Site Using Analytical Hierarchy Process (AHP) and Simple Additive Weighting (SAW) Murdiyanto, Aris Wahyu
Compiler Vol 8, No 1 (2019): Mei
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (657.729 KB) | DOI: 10.28989/compiler.v8i1.429

Abstract

The keyword is one or a group of words used by websites to improve your visibility on search engines. The selection of keywords from the results displayed by Google's keyword planner still not match the expectations of the webmaster, so that needs to be determined the choice and order of priority keywords which will be optimized beforehand. Therefore, a system that supports webmasters in making decisions on choosing keywords that will be optimized previously for search engines is needed. The methods used in this research is Analytical Hierarchy Process (AHP) to find the weighting parameters and Simple Additive Weighting (SAW) applied to find the final value and rank. The results showed that the system is running as expected, so it can be used as a basis in support of the decision of the webmaster in determining the priority of the optimization of keywords that will be worked out with the results of the comparison between the manual system with 100%. 
System for Determining Public Health Level Using the Agglomerative Hierarchical Clustering Method Suhirman, Suhirman; Wintolo, Hero
Compiler Vol 8, No 1 (2019): Mei
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (830.053 KB) | DOI: 10.28989/compiler.v8i1.425

Abstract

Regions having higher level of welfare do not always have better indicator values than other regions having lower level of welfare. The problem is the lack of information related to the indicator values needed to determine the health level. Therefore, clustering using health data becomes necessary. Data were clustered to see the maximum or the minimum level of similarity. The clustered data were based on the similarity of four morality indicator values of the regional health level. Morality indicator values used in this research are infant mortality rate, child mortality rate, maternal mortality rate, and rough birth rate. The method used is Agglomerative Hierarchical Clustering (AHC) - Complete Linkage. Data were calculated using Euclidean Distance Equation, then Complete Linkage. Four clustered data were grouped into two clusters, healthy and/or unhealthy. The result, combining from all clusters into two large clusters to see healthy and unhealthy results.
Performance Analysis of Wireless Local Area Network Using Router Tenda N-300 Waluyo, Catur Budi; Erik, Alber; Astuti, Yenni
Compiler Vol 8, No 1 (2019): Mei
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (819.784 KB) | DOI: 10.28989/compiler.v8i1.424

Abstract

Today's wireless communication system is a trend for the information society. This is inseparable from communication needs with high mobility and low costs. One of them is the Wireless Local Area network with the IEEE 802.11 standard. Wireless LAN is a communication technology that uses radio wave transmission media by utilizing free space as a transmission line. The transmitted signal is strongly influenced by distance, frequency, transmitter power, receiver sensitivity, and antenna gain. A loss occurs in the process of transmitting data from the sender to the recipien. In order to no loss that occurs, it requires a good performance, and a wide coverage area. The purpose of this study is to analyze the QoS data, calculate the coverage area, receiver power, and compare the results of theoretical calculations with the measurement results. The analysis results show the average throughput for each data rate of 6 Mbps, 15 Mbps and 35 Mbps at 383.8 kbps, 328.2 kbps and 329.8 kbps. The average delay is 5.28 ms, 4.81 ms and 4.66 ms. The average packet loss is 2.83% ms, 2.66% ms and 2.16% ms. The average jitter is 0.036 ms, 0.032 ms and 0.014 ms.
Introduction to Yogyakarta Icons in The Game of Running Challenge Bonai, Angga Adha Nugroho; Nugraheny, Dwi; Agustian, Harliyus
Compiler Vol 8, No 1 (2019): Mei
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (861.546 KB) | DOI: 10.28989/compiler.v8i1.432

Abstract

Yogyakarta's strong culture makes Yogyakarta one of the tourist areas frequented by tourists, both foreign tourists and local tourists. The Visitors come from various groups, for example visitors who come with family or individuals. A game model is needed that can facilitate the child in remembering the tourist icons in Yogyakarta through a Game Running Challenge that is made as attractive as possible and can run on the Windows operating system. The game running challenge application can provide convenience to users who are children aged 6-10 years to get to know and know the most famous icons in Yogyakarta through a game. So that it can be an educational medium that has a pattern of learning by doing learning. 
Django Framework and Python-Gammu as Middleware SMS Broadcast Cahyo, Puji Winar; Wicaksono, Arief Ikhwan
Compiler Vol 8, No 1 (2019): Mei
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (630.077 KB)

Abstract

Because the growing of mobile technology in recently days, technology practitioners are required to be able to create a variety of devices and media that support the mobile technology. Application developers compete to create mobile applications that have a variety of features, including video call, voice sending, image sending or text messaging. Developing of mobile applications have an impact on using of Short Message Service, although using of Short Message Service began to shift, but the Short Message Service feature cannot be abandoned, because Short Message Service is a standard feature carried by mobile devices (mobile phones). For this reason, we need to develop Short Message Service Broadcast middleware as an intermediary for Short Message Service communication between web technology and mobile devices. This technology is using for disseminating information between systems that have been built with mobile devices via Short message service. Broadcast system will produce information about new student admissions, That will be received directly by Senior High School Students through their mobile phones. The Middleware can send message broadcast in real time to more than 500 cellular numbers automatically with an average time of 13 seconds for one message. The advantage of using this technology is direct configuration with Python Back-End. Meanwhile, Technology for message inbox still requires further configuration.
Three Dimensional Simulation of Changes in Air Flow on a Jet Engine Desktop Based Retnowati, Nurcahyani Dewi; Mulyani, Sri; Talantha, Frencha
Compiler Vol 8, No 1 (2019): Mei
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1661.674 KB) | DOI: 10.28989/compiler.v8i1.431

Abstract

Learning about changes in air flow on jet engines requires a clear understanding because there are parts of the jet engine that work according to their functions and are interconnected. People often have difficulty understanding learning about changes in air flow in the jet engine and also about the brayton cycle. This study aims to make a simulation that explains the changes in air flow in a jet engine with a three-dimensional animated form in order to improve understanding of learning about it. The process of making three-dimensional simulations uses animation modeling techniques, texturing, lighting, editing, and rendering. In modeling and texturing on jet engines following the Brayton cycle. The three-dimensional simulation results show that this simulation can be run by computers with Windows 7 and Windows 8 operating systems, and from the results of user test analysis 80.2% agree that this three-dimensional simulation can be understood and can explain changes in airflow in jet engines.
Implementation and Performance Analysis of Private Cloud Using Openstack Swift and Rclone Aditama, Candra; Priadana, Adri
Compiler Vol 8, No 1 (2019): Mei
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1332.694 KB) | DOI: 10.28989/compiler.v8i1.428

Abstract

Many companies need a storage system that can be accessed in real time by all parts of the company. Most digital data storage methods today still use conventional methods where data is stored on an external hard disk or public cloud. Storage with external hard disk media makes accessing data difficult and has the risk of data loss when storage media is damaged. On the other hand, the storage method using public cloud requires an internet connection with large bandwidth requirements and the company still has to spend a budget on renting it. This study aims to design digital data storage methods using a private cloud that can be accessed in real time by all parts of the company without having to spend a budget on hiring a storage media and renting an internet connection with large bandwidth requirements. A private cloud was built using OpenStack Swift as an object storage service provider and Rclone as a cross-platform computer data management application. The results of this study are the creation of a private cloud that runs object storage services using Swift storage objects with relatively light and high scalability to meet the needs of storing data effectively and efficiently. A private cloud-based data storage media with relatively light and high scalability to meet data storage needs. Data storage media that can be accessed easily without having to use an internet connection with large bandwidth requirements.
VLAN Wireless Performance Analysis Of Central Access Point Management Topology According to the IEEE 802.11 Standard Wicaksono, Arief Ikhwan; Setiawan, Chanief Budi
Compiler Vol 8, No 2 (2019): November
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (941.493 KB) | DOI: 10.28989/compiler.v8i2.525

Abstract

Wireless network distribution is the right solution to disseminate network services in places and areas that are difficult to reach by cable networks. The effort to add a number of access points is intended to increase the coverage area of a network service so that the signal coverage can be even and broad. The development and improvement of wireless network users have made management and user management activities not easy, because of the way wireless technology works in the operational delivery of its packages, sorting and dividing the packages into 3 parts. Among them are packaged in the form of management, control, and data. Whereas if the management prioritizes data without considering management and control, the emergence of vulnerability in network distribution activities will occur when users are increasingly populated. To facilitate the flexibility and mobility of centralized wireless network users, this study utilizes VLANs that will be implemented at OSI Layer 2 to facilitate the classification of user-profiles, subnetting, securing, and roaming features between access point devices and their users. This research in its testing uses QoS parameters that refer to ITU G.165 / G.168 to monitor the quality of services provided. The parameters used in the measurement of interconnection include Throughput, Packet Loss Ratio, Latency, Jitter, and Delay. If the test is declared successful and complete, it is continued by analyzing and evaluating the results of the study in the hope that the system will successfully cluster the users based on the user characteristic dataset 
Performance Analysis of Illumination Invariant Change Detection Method for Detecting Image Change in Night Vision Camera Priadana, Adri
Compiler Vol 8, No 2 (2019): November
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1054.897 KB) | DOI: 10.28989/compiler.v8i2.514

Abstract

At present, the use of video cameras is not only limited to documenting events but is also used for surveillance systems. Changes in lighting that occur in the surveillance area is one of the problems that result in a false alarm on the surveillance system. Illumination Invariant Change Detection is a method for detecting image changes on images. This study aims to determine the performance of the Illumination Invariant Change Detection method to detect image changes in night vision surveillance cameras. The Illumination Invariant Change Detection method does not work well for detecting image changes on a night vision camera under dark lighting conditions at an average value of Lux 0 with an infrared lamp on. The accuracy of the application of the method to detect image changes on night vision cameras is 80% with the selection of the threshold value of the detection of image changes that is 75000 pixels.