cover
Contact Name
Hero Wintolo
Contact Email
herowintolo@stta.ac.id
Phone
-
Journal Mail Official
informatika@stta.ac.id
Editorial Address
-
Location
Kab. bantul,
Daerah istimewa yogyakarta
INDONESIA
Compiler
ISSN : 22523839     EISSN : 25492403     DOI : 10.28989/compiler
Core Subject : Science,
Jurnal "COMPILER" dengan ISSN Cetak : 2252-3839 dan ISSN On Line 2549-2403 adalah jurnal yang diterbitkan oleh Departement Informatika Sekolah Tinggi Teknologi Adisutjipto Yogyakarta. Jurnal ini memuat artikel yang merupakan hasil-hasil penelitian dengan bidang kajian Struktur Diskrit, Ilmu Komputasi , Algoritma dan Kompleksitas, Bahasa Pemrograman, Sistem Cerdas, Rekayasa Perangkat Lunak, Manajemen Informasi, Dasar-dasar Pengembangan Perangkat Lunak, Interaksi Manusia-Komputer, Pengembangan Berbasis Platform, Arsitektur dan Organisasi Komputer, Sistem Operasi, Dasar-dasar Sistem,Penjaminan dan Keamanan Informasi, Grafis dan Visualisasi, Komputasi Paralel dan Terdistribusi, Jaringan dan Komunikasi, Desain, Animasi dan Simulasi Pesawat Terbang. Compiler terbit setiap bulan Mei dan November.
Arjuna Subject : -
Articles 423 Documents
Combination of XOR Binary Algorithm and Steganography Using Least Significant Bit (LSB) Method for Data Security Yulius Nahak Tetik; Friden Elefri Neno; Dony Ariyus
Compiler Vol 8, No 2 (2019): November
Publisher : Institut Teknologi Dirgantara Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1045.233 KB) | DOI: 10.28989/compiler.v8i2.471

Abstract

Along with the development of technology and information today, data security is a problem that needs to be done to maintain the confidentiality of data or information both personally and within an organization. Cryptography is one of the sciences or arts that learns about how to secure data or information from irresponsible parties who want to destroy important data in the form of text and image files. This research, data security technique uses two algorithms, namely steganography to enter text in image media using LSB (Least Significant Bit) method and Binary XOR used to convert messages to binary with XOR keywords and generate pixel values of messages from 8 bits of images with LSB (Least Significant Bit). After encrypted the image will be sent to the user, and to view the original data, the user must decrypt the data with the message key and retrieve the LSB (Least Significant Bit) value, from the encrypted image.
SENDING DRONE FLYING SPEED DATA USING ANDROID-BASED CLIENT SERVER METHOD Daewu Gus Bintara Putra; Anggraini Kusumaningrum
Compiler Vol 9, No 1 (2020): Mei
Publisher : Institut Teknologi Dirgantara Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (552.244 KB) | DOI: 10.28989/compiler.v9i1.666

Abstract

Abstract - Drones as Unmanned Aerial Vehicle that are controlled using remote control are experiencing better development. The speed of the drone that cannot be accessed on the remote control can be determined through a client-server based application. The client side application, named Mydrone, is placed on the drone while on the server side, named Admin Drone, on earth. Mydrone and Admin Drone are applications made in this research based on andorid. This application on the client and server is used to monitor the speed of flying drones by using the Google Play Service library. Data sent from the client to the server in realtime by using Google Firebase. From the tests carried out it can be seen the speed of the drone when flying horisontal ly, while when flying vertically the speed is not detected. Battery capacity will also decrease when the speed of the drone gets faster, this is seen in the data when the speed is 8,741 km / h, the electricity demand taken from the battery is 31%.
ANALYSIS OF IGRP PERFORMANCE IN WDS MESH TOPOLOGY BASED ON IEEE 802.11 STANDARDS Arief ikhwan Wicaksono; Chanief Budi Setiawan
Compiler Vol 7, No 2 (2018): November
Publisher : Institut Teknologi Dirgantara Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (899.218 KB) | DOI: 10.28989/compiler.v7i2.369

Abstract

Redundancy and robustness are the most common problems in a wireless network distribution system, network system problems that are not able to handle coverage areas in a large / wide coverage, so that the network users are easily disconnected from the connection and out of the server radius. These problems are caused by topology and wireless network distribution methods that are not in accordance with the needs and coverage of its users. However, adding a number of access points en masse to expand the network without being based on appropriate applied methods, is not necessarily able to minimize complaints from network users. Starting from the problems described in the previous paragraph, in this study a wireless distribution mesh system topology (WDS mesh) will be built to improve utility and network usage in the area / radius of the area between access points using wireless lines and minimize cable requirements which are generally the main constraints in network deployment and installation to areas that are difficult to reach. The topology built in this research will implement the wireless routing protocol that results from the analysis and observation process to expand the expansion of service areas to places that are difficult to reach. The wireless routing protocol method used in this study is the Made Mesh Easy (MME) method which is one of the developments of the Interior Gateway Routing Protocol (IGRP) method. Evaluation of the wireless routing protocol in the WDS mesh network topology will be carried out periodically to obtain the results of the analysis that will be used to re-configuring and re-routing to maintain the quality of the network remains realiable. Mesh clients will give feedback on the quality of service obtained based on observations according to IEEE 802.11 standardization. The parameters used are: Througput, Packet Loss Ratio, Latency, Jitter, MOS, Post Dial Delay and Echo Cancelation (EC)
Three Dimensional Simulation of Changes in Air Flow on a Jet Engine Desktop Based Nurcahyani Dewi Retnowati; Sri Mulyani; Frencha Talantha
Compiler Vol 8, No 1 (2019): Mei
Publisher : Institut Teknologi Dirgantara Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1661.674 KB) | DOI: 10.28989/compiler.v8i1.431

Abstract

Learning about changes in air flow on jet engines requires a clear understanding because there are parts of the jet engine that work according to their functions and are interconnected. People often have difficulty understanding learning about changes in air flow in the jet engine and also about the brayton cycle. This study aims to make a simulation that explains the changes in air flow in a jet engine with a three-dimensional animated form in order to improve understanding of learning about it. The process of making three-dimensional simulations uses animation modeling techniques, texturing, lighting, editing, and rendering. In modeling and texturing on jet engines following the Brayton cycle. The three-dimensional simulation results show that this simulation can be run by computers with Windows 7 and Windows 8 operating systems, and from the results of user test analysis 80.2% agree that this three-dimensional simulation can be understood and can explain changes in airflow in jet engines.
ANALYSIS OF MARKETPLACE CONVERSATION TRENDS ON TWITTER PLATFORM USING K-MEANS Ulil Amri Nasron; Muhammad Habibi
Compiler Vol 9, No 1 (2020): Mei
Publisher : Institut Teknologi Dirgantara Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (683.942 KB) | DOI: 10.28989/compiler.v9i1.579

Abstract

Businesses began to shift from the marketing process that used to use conventional media to switch to using the internet and social media. This is because the cost of marketing using the internet and social media is cheaper than using conventional media. The problem that is often faced by businesspeople when marketing on social media is that they rarely see a marketplace that is becoming a trend and is being discussed by consumers on social media, so the marketing process is carried out less than the maximum. This study aims to analyze conversation trends related to the marketplace on the Twitter platform. The method used in this study is the K-Means Clustering method. Based on the results of the study found that the application of the K-Means Clustering method can produce sufficient information as a basis for consideration of businesspeople in choosing a marketplace. Marketplace trend analysis results show that Shopee, Lazada, and Tokopedia are highly discussed marketplaces on Twitter.
E-book limitation with library portable document format java script for accessing digital library Harliyus Agustian; Agung Nugraha
Compiler Vol 10, No 1 (2021): Mei
Publisher : Institut Teknologi Dirgantara Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1175.896 KB) | DOI: 10.28989/compiler.v10i1.960

Abstract

The function of the Adisutjipto-Aerospace Institute of Technology (ITDA) library is to provide borrowing and reimbursement services for books insured by members of the library. The books which increase in number each year occupy a lot of space in the library, it is therefore necessary to study it so that the form of this book is no longer physical but digital or paperless to be able to be stored on a server computer. This form of library is known as a digital library or e-library. The electronic library is a modern library as a place which provides a source of educational information with more convenience and security. The flow in the application is not very different from the flow in the manual library. Security becomes an important part of an application, by limiting network access, accessing PDF documents and implementing PDF Viewer using the PDF.js library by rendering PDF documents on a canvas capable of blocking illegal downloads. Based on the test results, the electronic library application can work properly. The speed of opening a PDF document is influenced by the speed of the server, the content contained in the PDF and the size of the PDF file.
PEMANFAATAN GEOFENCE UNTUK MENCARI LOKASI BENGKEL TAMBAL BAN TERDEKAT BERBASIS ANDROID Wildan Azzami; Anggraini Kusumaningrum; Sudaryanto Sudaryanto
Compiler Vol 7, No 1 (2018): Mei
Publisher : Institut Teknologi Dirgantara Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (383.696 KB) | DOI: 10.28989/compiler.v7i1.285

Abstract

The number of vehicles in Indonesia continues to increase every year. It will also be directly proportional to many people who have problems with their vehicles, such as finding a tire leaking from a nail puncture or other causes. And will also increase the need for tire services. For vehicle users who do not know the area around when experiencing leak tire disaster, then directly proportional to search for the nearest tire repair shop will be difficult. Therefore, in this study developed information media in the form of Android-based applications to map the locations - workshop tire repair shop, as well as search for the nearest tire patch based on the location of the rider by using geofence system, where in this application the user will be notified the nearest workshop with a blink on the animated image tire repairs. From the test results, this application is able to help users search for the nearest tire repair shop along with the distance from the user location. This application is also able to show related information as well as showing the distance and route of the road that will be taken from the location of the user with the location of the intended tire patch by utilizing google maps applications. Applications have been tested by questionnaire method distributed to 30 respondents with 10 questions and the results of the questionnaire calculated using the likert scale get 76,2% results and included in either category
Simulator Modules for Learning Maintenance of Avionics Components in Solid State Cockpit Voice Recorder (SSCVR) PN. 980-6022-001 and Aircraft Battery PN. 405CH Dwinny Puspa Dinar Saputri; Dwi Nugraheny
Compiler Vol 8, No 2 (2019): November
Publisher : Institut Teknologi Dirgantara Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (791.006 KB) | DOI: 10.28989/compiler.v8i2.521

Abstract

PT GMF AeroAsia Tbk is an international company that provides the largest maintenance facilities and services in Asia. The divisions in PT GMF AeroAsia Tbk one of which is the Avionics Shop division, where the division is a part that performs maintenance of avionics components such as Solid State Cockpit Voice Recorder (SSCVR), Flight Data Recorder (FDR), Aircraft Battery and all other electronic components that is in the plane. At the Avionics Shop at PT GMF AeroAsia Tbk for the maintenance training needs of the avionics component, a simulator is needed as a learning media about the process of introducing, assembling and dismantling a PN Solid State Cockpit Voice Recorder (SSCVR) component. 980-6022-001 and Aircraft Battery PN. 405CH. The simulator is built using Unity 3D and asset modeling using Blender. The results of the functionality test state that the simulator can run well according to its function. The results of the due diligence obtained an average value of 90.4 which is included in the category of "Very Good" and stated that the simulator has met the needs that underlie the design of the simulator, meets the needs of all interested parties, and can be run well on several different platforms.
WEB-BASED DECISION SUPPORT SYSTEM FOR GUEST STAR DETERMINATION IN E-MARKETPLACE USING WEIGHTED PRODUCT METHOD Asih Pujiastuti; Anggraini Kusumaningrum; Muhammad Ali Sofyan
Compiler Vol 9, No 2 (2020): November
Publisher : Institut Teknologi Dirgantara Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1277.786 KB) | DOI: 10.28989/compiler.v9i2.824

Abstract

At an event, the event organizer usually requires guest stars as performers. Event organizers often find it difficult to find a guest star that suits their needs for their event. The purpose of this research is to build an e-marketplace application as a web-based decision support system that can be used to find alternative decisions to choose guest stars according to the criteria using product weighting methods. The weighted product method is one of the methods that can be applied to web-based decision support system applications for determining guest stars in e-marketplaces. There are three criteria used to determine guest stars in this e-marketplace, these criteria are the type of show, price and location. As for the alternatives that were tested, there were nine alternatives consisting of guest stars in Yogyakarta. Functionality testing is carried out using the black box method and the result is that all functions and validation buttons on the e-marketplace can function properly. The result of calculation using the weighted product method is the guest star with the highest yield is Frengki Sermadi with a value of 0.135234, while the guest star with the lowest result is Sanggar Titik Dua with a value of 0.083222.
PENGENALAN WARNA BERBASIS ANDROID MENGGUNAKAN METODE TEMPLATE MATCHING Indra Hading Kurniawan; Nurcahyani Dewi Retnowati
Compiler Vol 7, No 1 (2018): May
Publisher : Institut Teknologi Dirgantara Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (542.095 KB) | DOI: 10.28989/compiler.v7i1.278

Abstract

Template matching method is a simple and widely used method to recognize patterns. The weakness of this algorithm is the limited model that will be used as a template as a comparison in the database such as shape, size, and orientation. The Extraction Feature algorithm addresses the problem of template models such as the shape, size, and orientation that exist in the matching template algorithm by mapping the characteristics of the image object to be recognized. Optical character recognition is used to translate characters into digital images into text formats. Its simple implementation makes the template matching method widely used. In this final project discusses the introduction of color in an image to be detected color, this color recognition is not fully successful because of the influence of lightness. The workings of this application take picture is by taking a picture and then the application identifies the color of any existing and will issue results in the form of text percent, with a success rate of 15% and 85% failure when detecting a color.