cover
Contact Name
Hero Wintolo
Contact Email
herowintolo@stta.ac.id
Phone
-
Journal Mail Official
informatika@stta.ac.id
Editorial Address
-
Location
Kab. bantul,
Daerah istimewa yogyakarta
INDONESIA
Compiler
ISSN : 22523839     EISSN : 25492403     DOI : 10.28989/compiler
Core Subject : Science,
Jurnal "COMPILER" dengan ISSN Cetak : 2252-3839 dan ISSN On Line 2549-2403 adalah jurnal yang diterbitkan oleh Departement Informatika Sekolah Tinggi Teknologi Adisutjipto Yogyakarta. Jurnal ini memuat artikel yang merupakan hasil-hasil penelitian dengan bidang kajian Struktur Diskrit, Ilmu Komputasi , Algoritma dan Kompleksitas, Bahasa Pemrograman, Sistem Cerdas, Rekayasa Perangkat Lunak, Manajemen Informasi, Dasar-dasar Pengembangan Perangkat Lunak, Interaksi Manusia-Komputer, Pengembangan Berbasis Platform, Arsitektur dan Organisasi Komputer, Sistem Operasi, Dasar-dasar Sistem,Penjaminan dan Keamanan Informasi, Grafis dan Visualisasi, Komputasi Paralel dan Terdistribusi, Jaringan dan Komunikasi, Desain, Animasi dan Simulasi Pesawat Terbang. Compiler terbit setiap bulan Mei dan November.
Arjuna Subject : -
Articles 423 Documents
PERMAINAN CATUR INGGRIS BERBASIS ANDROID MENGGUNAKAN ALGORITMA MINIMAX Deni Fajar Pratama; Elizabeth Nurmiyati Tamatjita; Dwi Nugraheny
Compiler Vol 5, No 2 (2016): November
Publisher : Institut Teknologi Dirgantara Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (147.683 KB) | DOI: 10.28989/compiler.v5i2.167

Abstract

Today development of computer technology is growing rapidly, especialy in term of the game are certainly not stranger for the fans, from children to adults. The game has a positive impact that could indirectly hone the ability o f the brain and improve memory and patience.  Catur Inggris is a strategy game like chess origin from Pekanbaru city, Riau province is generally played by two people, but more simple. Catur Inggris is based on Android with the programming C # language. Catur Inggris using Minimax algorithm with three difficulty levels that is, easy, medium, and hard. Minimax algorithm is an algorithm that using Depth-First Search method to find solutions step with limited depth. The results obtained from the test results using the algorithm method Minimax with Depth-First Search managed to generate possible winning position. Results obtained from tests using Minimax algorithm is 80% with five depth o f Depth-First Search tree four wins for the computer and a victory for the player, therefore Minimax algorithm can work well Catur Inggris game, and results test for user with 30 respondents get results 84%, therefore Catur Inggris game had a very good response from the users
KONFIGURASI INTER-VLAN PADA CISCO BERBASIS GRAPHICS USER INTERFACE (GUI) SEBAGAI PEMBELAJARAN PERALATAN JARINGAN KOMPUTER CISCO Aditya Wisnu Pratama; Hero Wintolo; Yenni Astuti
Compiler Vol 2, No 2 (2013): November
Publisher : Institut Teknologi Dirgantara Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (145.459 KB) | DOI: 10.28989/compiler.v2i2.207

Abstract

Computer network using LAN has limitations in terms of the large number of computers that will be connected to the switch equipment. This limitation can be overcome by connecting the LAN between each other using a router. Networks inter LAN still pose a problem in terms of safety, although the amount can be overcome. To overcome the problem requires a LAN in a small group that is often known as Virtual Local Area Network (VLAN). VLAN can be connected as is often done on the LAN in general with the addition of some equipment that is able to be used as the connecting or known by the name of inter-VLAN. inter-VLAN configuration can be done directly and indirectly. the configuration directly by configuring the network equipment such as switches and routers, while the indirect configuration can be done using packet tracer. In doing inter-VLAN configuration requires a command performed by an administrator. Commands that is configured on the network equipment is a command that is still a command line or a particular script. For people who have not worked as a network administrator needed a software Graphics User Interface (GUI) for ease in studying network administration. Software Graphics User Interface (GUI) can facilitate a person who has worked as an administrator to configure inter-VLAN.
PERBANDINGAN METODE FUZZY TSUKAMOTO DAN MAMDANI UNTUK MEREKOMENDASI NILAI SIMPANAN TABUNGAN BERDASARKAN SALDO RATA-RATA HARIAN PADA KOPERASI JASA KEUANGAN SYARIAH (STUDI KASUS DI BMT BINA IHSANUL FIKRI) Safik Omara; Anton Setiawan Honggowibowo; Hero Wintolo
Compiler Vol 1, No 1 (2012): Mei
Publisher : Institut Teknologi Dirgantara Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (501.07 KB) | DOI: 10.28989/compiler.v1i1.10

Abstract

Funding accumulation should be designed to attract people to save in the institution money islamic. Savings Islamic investment is to apply the system to yield a return on investment. The value of customer revenue will never be the same each month even though they are the same a mount. Therefore, we need an alternative form of information storage decisions to be based recommendations for the specific results. For the results calculated by the method of the average daily balance is multiplied by other factors such as per classification average balance bank of funds, and the ratio(%). The average balance is the accumulation of sediment balance is divided by the number of days in a month. The application of fuzzy inference systems Tsukamoto and madman will be compared to the recommended savings will be applied to the system. Fuzzy logic has a degree of  membership that represented the values 0 and 1, to be more balanced in the calculation is limited by certain factors. Factors include the amount of sediment balance and sediment balance your time to calculate the value of savings products or recommendations.Application of fuzzy Tsukamoto and  Mamdani gives an overview of the differences indetermining the final outcome of the process defuzzifikasi, so that the known method is more suitable for recommending the value of deposits with a limited output of certain values (lower and upper limit of deposits). Fuzzy calculations have been tested with analysis of mathematical calculations manually and generate the same value.ListenRead phonetically
PERANCANGAN SISTEM PENDINGIN THERMO ELECTRIC COOLING BERBASIS MIKROKONTROLER AT89C51 Agus Basukesti
Compiler Vol 1, No 2 (2012): November
Publisher : Institut Teknologi Dirgantara Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (166.217 KB) | DOI: 10.28989/compiler.v1i2.26

Abstract

Tulisan ini akan membahas manfaat thermo electric cooling sebagai pendingin dengan dukungan Mikrokontroler  sebagai pengendali otomatis. Rancangan dapat dimanfaatkan pada sistem  pengendalian peralatan, kinerja sistem   terpengaruh panas,  sistem-sistem lain yang berbaya jika bekerja pada suhu tinggi,  serta dikendalikan dari jarak jauh. Kebutuhan perangkat keras rancangan ini  adalah thermo electric cooling, Mikrokontroler AT89C51, IC LM 35, A/D Converter, penampil, dan Regulator 7805 serta didukung bahasa Assembler earth.asm.  Sebelum perancangan dilaksanakan pengujian peralatan-peralatan, supaya sistem dapat berjalan dengan baik dan sesuai dengan fungsinya masing-masing. Untuk mengetahui kinerja system  pendingin ini dengan cara mengamati data hasil simulasi pada tiga keadaan kondisi suhu prosesor dan heatsink prosesor  pertama menggunakan heatsink standar, kedua water block dan ketiga water block ditambah thermo electric cooling. Dari hasil grafik menunjukkan bahwa system pendingin thermo electric cooling paling efektif dibandingkan dengan heatsink dan water block.Dengan melihan hasil tersebut rancangan pendingin berbasis mikrokontroler ini dapat sebagai tambahan pengetahuan bahkan  dapat dikembangkan untuk memenuhi kebutuhan dan  mengatasi permasalahan  data/informasi yang banyak dibutuhkan.
PERANCANGAN DAN PENERAPAN ALGORITMA NAKULA SADEWA UNTUK MENGATASI DUPLIKASI PEMILIHAN DI TEMPAT PEMUNGUTAN SUARA Yogi Priyo Prayogi; Hero Wintolo; Yuliani Indrianingsih
Compiler Vol 2, No 2 (2013): November
Publisher : Institut Teknologi Dirgantara Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (246.828 KB) | DOI: 10.28989/compiler.v2i2.43

Abstract

The security o f election's data in a manual election process is susceptible to some fraud activity, one of them is voter's identity theft activity which will be used to vote more than one time. The regulation which allow the voter to vote on another town has  became a hole that can be used the perpetrator to vote using stolen identity as no one knows him and his true identity. This fraud activity will have direct impact to the result o f election. This fraud can be contained by using Nakula Sadewa Algorithm which will analyze and compare the voter's home voting place to the voting place that the voter's use to do the voting activity. The voter's can still vote on another town, but heavily encouraged to vote on his hometown.
ANALISIS DAN RANCANGAN PROTOTIPE MANAJEMEN DOKUMENTASI REKAYASA PERANGKAT LUNAK Hanson Prihantoro Putro
Compiler Vol 3, No 1 (2014): Mei
Publisher : Institut Teknologi Dirgantara Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (227.406 KB) | DOI: 10.28989/compiler.v3i1.59

Abstract

In our department, lectures found that students are difficult to create documentation, especially software documentation. Besides, software documentation is an important handbook in a software engineering. We need tools to help students or people that learn software engineering to create software documentation. This paper explains how to analyze and design a prototype for software documentation management. We propose three steps to do: problem analysis, prototype development and evaluation. First, we do the problem analysis by defining the component inputs, documentation management models and printing process. Then, the prototype is developed with object oriented software analysis and design. Finally, we create a traceability table and conduct a design testing in the evaluation step. At the result, we build analysis and design for a prototype to manage software engineering documentation with six use cases. The evaluation is conducted which well modeling the functional requirements. 26 errors are found and already refined in the documentation report. We ensure that this design is ready to implement.
PEMBUATAN VIRTUAL TOUR GUIDE KABUPATEN TRENGGALEK MENGGUNAKAN METODE TRACING MAP Aditya Risan Prambudi; Nurcahyani Dewi Retnowati
Compiler Vol 3, No 2 (2014): November
Publisher : Institut Teknologi Dirgantara Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (168.439 KB) | DOI: 10.28989/compiler.v3i2.76

Abstract

Making of Trenggalek district Virtual Tour Guide Using Tracing Map Method is one of some solution to introduce tourism object and become guide for touristwho want to visit Trenggalek’s tourism place.Making of Trenggalek districtVirtual Tour Guide application integrating between adobe flash CS5.5’s design and action script 3 programming. Making of Trenggalek district Virtual Tour Guide application can use as one of some choice to get tourism information besides map and tourism’s coventional guide book.Based on a survey of 30 correspondents, the results showed that 55.33% of applications considered good, 32.67% stated that this application is quite good, 10% said very good and, 2% were less well expressed.
MEMBANGUN SISTEM KEAMANAN ARP SPOOFING MEMANFAATKAN ARPWATCH DAN ADDONS FIREFOX Kristopedus Zonggonau; Haruno Sajati
Compiler Vol 4, No 1 (2015): Mei
Publisher : Institut Teknologi Dirgantara Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (199.955 KB) | DOI: 10.28989/compiler.v4i1.87

Abstract

The Development of information Technology, especially computer networks and the service in a rejuvenate the human side. The development of the internet is very widespread. The security level digital data becomes vulnerable to attack by the attacker. Arp spoofing is one of the attacks in a network that can be used to view digital data traffic such as emails, passwords and etc, when is running in the network. The process of prevention againtst arp spoofing attacks, made an application to detect and block the attacker in the network by Firefox Addons. Attacker will be directly blocking (drop) into to Mikrotik OS. Users avoid the attack arp spoofing. The results of testing one, two and three can be detect and block the presentation of the results of 83%, so That’s the terms of security in the network can be safe from attack to the attacker.
DETEKSI JERAWAT PADA WAJAH MENGGUNAKAN METODE VIOLA JONES Haruno Sajati; Yuliani Indrianingsih; Puspa Ira Dewi Candra Wulan
Compiler Vol 5, No 1 (2016): Mei
Publisher : Institut Teknologi Dirgantara Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (224.202 KB) | DOI: 10.28989/compiler.v5i1.103

Abstract

Acne is a skin disease that most often grow in the face and very disruptive to affect the appearance of a person's face. Viola Jones is one method to help detect acne so someone get information about the state of the face and immediately overcome. Viola Jones Method has three main processes integral image is used to determine whether there is a feature haar particular in an image, the method adaboost machine learning is used to select features haar specific that will be used to adjust the threshold value, and a cascade classifier as the classification of the final determining regions the face in the picture. Testing of 30 samples, the results obtained showed that the method is less accurate Viola Jones is used as a method of detection of acne with results average 25 % the percentage of common acne, blackheads 0 % and 45% of cystic acne. The number of samples used to create xml greatly affect the results of detection.
PERANCANGAN MAIL CLIENT MENGGUNAKAN MEKANISME CREATE FOLDER OTOMATIS Anggraini Kusumaningrum; Astika Ayuningtyas; Lely Delvia Sipayung
Compiler Vol 6, No 1 (2017): Mei
Publisher : Institut Teknologi Dirgantara Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (900.641 KB) | DOI: 10.28989/compiler.v6i1.199

Abstract

The development of computer technology and telecommunications right now has changed the way society communicates. The technology used to communicate exists since the first Internet presence, that is to say by using the electronic mail. Email is a technology that allows everyone to communicate by sending messages or files. As with other ways that can be used to read and send emails, use the email client application. Email client is an application installed on a computer device used to access the email account on an email server, the email client does not need to use a browser application. But as long as this classification on email is still done manually on the part where the file storage download. To resolve the issue ranking of emails can be done automatically according to the name of the subject of e-mail, messages or files that are entered on the e-mail client of the application can then be downloaded and the data to download are stored in the folder that corresponds to the name of the subject e-mail, so that a message or file will be stored in a folder, it gives the convenience classification for mail client application mail user electronic with the number of messages or files that are much more consistent with the existing keywords in the subject of the email. This email client application can create folders automatically when downloading messages. Then, the downloaded file will be stored in the folder corresponding to the name of the subject. The file extension downloaded * .ml, the file can be opened via the mail client application. The mail client application can run on Windows and Linux operating systems.