Compiler
Jurnal "COMPILER" dengan ISSN Cetak : 2252-3839 dan ISSN On Line 2549-2403 adalah jurnal yang diterbitkan oleh Departement Informatika Sekolah Tinggi Teknologi Adisutjipto Yogyakarta. Jurnal ini memuat artikel yang merupakan hasil-hasil penelitian dengan bidang kajian Struktur Diskrit, Ilmu Komputasi , Algoritma dan Kompleksitas, Bahasa Pemrograman, Sistem Cerdas, Rekayasa Perangkat Lunak, Manajemen Informasi, Dasar-dasar Pengembangan Perangkat Lunak, Interaksi Manusia-Komputer, Pengembangan Berbasis Platform, Arsitektur dan Organisasi Komputer, Sistem Operasi, Dasar-dasar Sistem,Penjaminan dan Keamanan Informasi, Grafis dan Visualisasi, Komputasi Paralel dan Terdistribusi, Jaringan dan Komunikasi, Desain, Animasi dan Simulasi Pesawat Terbang. Compiler terbit setiap bulan Mei dan November.
Articles
423 Documents
SIMULASI SELF DEFENSE SEBAGAI SARANA PEMBELAJARAN MENGHADAPI PEMBAJAKAN PESAWAT KOMERSIAL MENGGUNAKAN METODE FRAME BY FRAME
Nurcahyani Dewi Retnowati;
Zikri Mardhatillah
Compiler Vol 4, No 2 (2015): November
Publisher : Institut Teknologi Dirgantara Adisutjipto
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (282.54 KB)
|
DOI: 10.28989/compiler.v4i2.97
Self defenseis a system for defending selfwhich is used to defeat the opponent quickly and without spending a lot of energy. Self defense training is also very needed for pilots and flight attendants, for example to confront the hijacking of commercial flight.Self defense can be trained through the medium of interactive multimedia with 3D animation content. This interactive multimedia was built by using adobe flash professional software, and 3D content using Lightwave 3D software. The result gets from trials to 30 respondents is this learning simulation is used because it is worth more than 50% of users give good response to simulation as a whole.
PENCARIAN INFORMASI DATA PESAWAT MENGGUNAKAN NOMOR REGISTRASI PESAWAT DENGAN MEMANFAATKAN DATABASE DAN JSON
Yulis Robert Latumaone;
Haruno Sajati;
Nurcahyani Dewi Retnowati
Compiler Vol 5, No 2 (2016): November
Publisher : Institut Teknologi Dirgantara Adisutjipto
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (338.648 KB)
|
DOI: 10.28989/compiler.v5i2.172
Currently, not much o f public didn’t know about the information of data aircraft, the manufacture and type is sample. The aircraft also has registration number which not same between one aircraft with another aircraft. Information retrival of data aircraft can used registrationnumber with developed in an applicationwith take advantage of database and JSON (JavaScript Object Notation). JSON is a data exchange system that ’s easily translated in to the language o f computer or human. Data exchange these give mean make the distribution application base o f webservices. Web services is a system that provide service the another system to share resource. Procces o f made an application with base of web services must suitable with SOA (Service Oriented Architecture), where SOA is a model representation to up model shape which hasdistribution. For Implementation SOA, it can use the language of programming PHP (Hypertext Preprocessor). Tested on six aircraft, indicated o f airport and airline data can to point out that use of database and JSON can be run well. Decided o f internet network is an obtacle to present data.
REKAYASA ROUTER UNTUK PENYIMPANAN DATA
Iswan Puji Rahmanto;
Anggraini Kusumaningrum
Compiler Vol 6, No 2 (2017): November
Publisher : Institut Teknologi Dirgantara Adisutjipto
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (433.805 KB)
|
DOI: 10.28989/compiler.v6i2.229
Data communication is the process by which a resource on a computer can be used by other computers on the condition that the second computer is already connected to a communications network. To connect the computer to the router so the need for different data transfer network will occur. With the process of sharing data on these networks, the delivery process and data storage will be faster and cost-effective because it does not require a computer as a storage medium, but a router connected to the storage media. To facilitate the process of sharing data between the two should have an operating system to be easy in the connection process. Differences platform on the operating system being used is not a hindrance so that the computer can be connected. With samba server software and some of the settings on the computer and the router can be mutual sharing of data on the network that is connected to the router.
IMPLEMENTASI DATA MINING UNTUK MERAMALKAN PENJUALAN DI MINIMARKET IDOLA JL PATI-TAMBAKROMO KM 2 DESA KARANGMULYO RT 08 RW 1 DENGAN METODE TIME SERIES
Hamdani Widyatmoko;
Anton Setiawan Honggowibowo;
NurCahyani Dewi Retnowati
Compiler Vol 1, No 2 (2012): November
Publisher : Institut Teknologi Dirgantara Adisutjipto
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (209.331 KB)
|
DOI: 10.28989/compiler.v1i2.15
Minimarket idola on a daily basis there are many sales transactions, so that the data stored in the database is very large. The data can be used as much useful information for the owner of a minimarket in policy making. To explore the data that is used a lot of data mining technique. Data mining uses data analysis to discover patterns and relationships in data that may be used to make accurate predictions.In this research, data mining is used to forecast the sales of goods in Minimarket Idoal. Forecasting the future based on measuring the value of the patterns in the data collection. To perform sales forecasting in the future to use the method of time series. Forecasting time series data to predict what will happen based on past historical data.Time series methods for forecasting sales in the calculation Minimarket Idola using exponential smoothing and moving average. Of the count sought the MAD (Mean Absolute Deviation) or forecasting errors. Where MAD is the smallest value of the calculation of exponential smoothing and moving average is the result of forecasting with a small error. Forecasting results will not always be appropriate because the market demand influenced by several factors. But it does not mean that the forecast is made useless.
SISTEM APLIKASI MONITORING RUANGAN BERBASIS WEBCAM
Debby Wahyu Sulistiyanto;
Agus Basukesti;
Nurcahyani Dewi Retnowati
Compiler Vol 2, No 1 (2013): Mei
Publisher : Institut Teknologi Dirgantara Adisutjipto
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (274.55 KB)
|
DOI: 10.28989/compiler.v2i1.32
Software design and hardware application system monitoring room webcam based aims to add value to the webcam to be used as part of the security system, implementing the work process of hardware and software monitoring system formed using delphi 7, analyzing the performance o f a stepper motor as the driving platform webcam and documenting object images and sounds in the room activities into a file format AVI (Audio Video Interleave). Webcams are used in this design is equipped with a standard webcam lighting lamps LED (Light Emitting Diode) with a USB data line, while the driver controls the webcam in the design o f this platform using unipolar type stepper motor controlled by a microcontroller, motor drivers and line interface RS232 to USB (Universal Serial Bus) converter. The installation o f the webcam to webcam platform play will lead to the right, left, stop rotating right and or to the left automatically. From the test results it can be concluded that the monitoring system and webcam based indoor stepper motor consists o f webcam applications and motor control applications platform which is separately because both applications use the USB and COM communication channels are opened simultaneously. As for the results o f the motion setting webcam platform proved to have a consistent degree of deviation for the wine and left turn kenanan but still require a series o f additional gears for smooth movement o f the platform and to reduce the effects o f shadow on motion pictures.
PENERAPAN ALGORITMA ARI BORNEO (AB) UNTUK PEMBACAAN TEKS DENGAN MEMANFAATKAN MICROSOFT SPEECH DAN ID1
Ari Restani;
Anton Setiawan Honggowibowo;
Yuliani Indrianingsih
Compiler Vol 2, No 2 (2013): November
Publisher : Institut Teknologi Dirgantara Adisutjipto
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (202.093 KB)
|
DOI: 10.28989/compiler.v2i2.48
Reading is an activity person to obtain information from something written. Reading involves recognition of the symbol and the letters that make a language. But there are some people who are lazy to read text in English language which is not a language that is used everyday by Indonesian people. In addition to reading, there are also the most common activities to obtain information that is heard. Hear is a way to gain an understanding of the meaning of the information in the form or sound using auditory senses. Reading activities contributed 10% ability for know information, with listening, knowing information can reach 30%. With conditions like this, then it needs an alternative media that can help treat the condition. The alternative media that can be made is text to speech fo r read text in Indonesia language and English language, for detection language using Ari Borneo Algorithm. These systems are made using Delphi 7 programming language, MBROLA Tools as Indonesia-speaking sound generators and Microsoft Speech API as English sound generator. Through this system, userscan absorb information from listening to the reading o f text by both systems.
ANALISA METODE MEDIAN PADA PENENTUAN TITIK TENGAH DI GOOGLE MAPS
Kurnia Rizki Novianto;
Sumarsono Sumarsono;
Yuliani Indrianingsih
Compiler Vol 3, No 1 (2014): Mei
Publisher : Institut Teknologi Dirgantara Adisutjipto
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (230.353 KB)
|
DOI: 10.28989/compiler.v3i1.65
Information technology to used facilitate the lives of humans in performing activities have come to the stage of the hand grip. The intent of this grip is a form of computer that is small and can be hand held adult human hand, for example in the form of smartphones, laptops, and tablets. This equipment can help people to access the internet that provide maps and location services on earth . With the internet user will easily dig resources with ease. Thus with the internet it is essential for human life until the source of the future. Problems that arise in the world of internet or computer network often arise and prevent the problem. Limitations of resources based on google maps is very necessary for a person to get the intended location. This system will help a person in getting the distance of the intersection to a point latitude and longitude coordinates by calculating the midpoint of the user, and then calculate the distance between the midpoint of the location suggested by the system so that the user gets close location to conduct meetings. To specify the system location data using Google Place API to obtain complete data locations along the coordinates of latitude and longitude of a location .
Analysis of web scraping techniques to get keywords suggestion and allintitle automatically from Google Search Engines
Aris Wahyu Murdiyanto;
Aris Wahyu Murdiyanto;
Adri Priadana
Compiler Vol 10, No 2 (2021): November
Publisher : Institut Teknologi Dirgantara Adisutjipto
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (613.619 KB)
|
DOI: 10.28989/compiler.v10i2.1064
Keyword research is one of the essential activities in Search Engine Optimization (SEO). One of the techniques in doing keyword research is to find out how many articles titles on a website indexed by the Google search engine contain a particular keyword or so-called "allintitle". Moreover, search engines are also able to provide keywords suggestion. Getting keywords suggestions and allintitle will not be effective, efficient, and economical if done manually for relatively extensive keyword research. It will take a long time to decide whether a keyword is needed to be optimized. Based on these problems, this study aimed to analyze the implementation of the web scraping technique to get relevant keyword suggestions from the Google search engine and the number of "allintitle" that are owned automatically. The data used as an experiment in this test consists of ten keywords, which each keyword would generate a maximum of ten keywords suggestion. Therefore, from ten keywords, it will produce at most 100 keywords suggestions and the number of allintitles. Based on the evaluation result, we got an accuracy of 100%. It indicated that the technique could be applied to get keywords suggestions and allintitle from Google search engines with outstanding accuracy values.
PENGOLAHAN CITRA DIGITAL BERBASIS WIRELESS 2.4 GHz DENGAN MEMANFAATKAN ARDUINO UNO REV 3
Andika Agung Firmansyah;
Denny Dermawan
Compiler Vol 4, No 1 (2015): Mei
Publisher : Institut Teknologi Dirgantara Adisutjipto
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (162.796 KB)
|
DOI: 10.28989/compiler.v4i1.81
Digital image processing of a system capable of generating digital image data and software as a medium to display the digital image data that uses radio waves to send data in HEX and convert in the form of images. Linksprite camera which enable to produce the digital image data and utilize the arduino UNO as a controller to send commands to the camera image capture and send the digital image data to the PC. The process of digital image based data transmission by radio waves utilizing the XBee Pro Series 1 . Results of testing the system implemented in the outdoor can take a longer distance when compared with the application of the system in the room . At a distance of 10-250 meters complete the full HEX data transmission and produces good images , with time ranging 2m.29s.39ms-2m.36s.56ms. Distance of 260-450 meters with a time of 2m.05s.02ms - 06ms 2m 01s but the picture quality is not good. At a distance of 500-530 meters with a time of 1m.10s.23ms-0m.50s.59ms produce images that are very less. While the distance of > 550 meters is the limit HEX data transmission capability to the receiver. The ability of the system mileage in the process of data transfer shorter if applied indoors. Distance of 1-60 meters with a time of 2m.29s.39ms - 60ms.2m.34s produce good quality images. At a distance of 80 meters with a time of 1m.25s.59ms produce poor images, and with a distance of 90 meters with a time 0m.35s.49ms produce images that are very less . While the distance of > 100 system not able to perform HEX data transmission
PERANCANGAN PENGAMANAN SERVER SECARA OTOMATIS MENGGUNAKAN METODE ADAM (AUTOMATIC EVENT DETECTION AND ACTIVITY MONITORING)
Anggraini Kusumaningrum;
Rolas Sianturi
Compiler Vol 4, No 2 (2015): November
Publisher : Institut Teknologi Dirgantara Adisutjipto
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (166.262 KB)
|
DOI: 10.28989/compiler.v4i2.92
In an era like today's global, Internet-based information system security is a must to be considered, because of the public nature of the internet network and global is not safe. Basically the threat is coming from someone who wishes mempuyai gain illegal access to a computer network. Whenever there is a threat encountered on the server such as port scanning, the attacker IP addresses will be captured. Next will be used method Automatic Event Detection And Activity Monitoring (ADAM) to process security. ADAM will carry out retaliatory attacks in the form of a computer virus that was sent to the attacker. For this reason when a computer network is attacked by the intruder, then ADAM server will detect this type of attack is done, then asked for help from another server to strike back. Security server by applying the method ADAM able to do the blocking of port scanning the attacker did not end there ADAM will then send the file is a virus automatically. In terms of time efficiency, the method of securing the ADAM automatically faster than if all phases of the security is done manually. ADAM test non-adaptive systems this takes 4.4 minutes, while the time taken by the ADAM system to immobilize the attacker system only 1 minute 03:59 seconds, so the method ADAM work faster. Traffic normal state (RX 232B, 144B TX), but when encountered in the form of port scanning attacks become 21.46Kib TX RX 25.83Kib, and after working as RX 219B ADAM TX127B, resulting in a significant reduction in traffic.