cover
Contact Name
Hero Wintolo
Contact Email
herowintolo@stta.ac.id
Phone
-
Journal Mail Official
informatika@stta.ac.id
Editorial Address
-
Location
Kab. bantul,
Daerah istimewa yogyakarta
INDONESIA
Compiler
ISSN : 22523839     EISSN : 25492403     DOI : 10.28989/compiler
Core Subject : Science,
Jurnal "COMPILER" dengan ISSN Cetak : 2252-3839 dan ISSN On Line 2549-2403 adalah jurnal yang diterbitkan oleh Departement Informatika Sekolah Tinggi Teknologi Adisutjipto Yogyakarta. Jurnal ini memuat artikel yang merupakan hasil-hasil penelitian dengan bidang kajian Struktur Diskrit, Ilmu Komputasi , Algoritma dan Kompleksitas, Bahasa Pemrograman, Sistem Cerdas, Rekayasa Perangkat Lunak, Manajemen Informasi, Dasar-dasar Pengembangan Perangkat Lunak, Interaksi Manusia-Komputer, Pengembangan Berbasis Platform, Arsitektur dan Organisasi Komputer, Sistem Operasi, Dasar-dasar Sistem,Penjaminan dan Keamanan Informasi, Grafis dan Visualisasi, Komputasi Paralel dan Terdistribusi, Jaringan dan Komunikasi, Desain, Animasi dan Simulasi Pesawat Terbang. Compiler terbit setiap bulan Mei dan November.
Arjuna Subject : -
Articles 423 Documents
UJI HIPOTESIS PADA HASIL PEMANFAATAN PEMETAAN SMA (STUDI KASUS KAB. KARANGANYAR) Mukhamad Richo Mafazan; Sumarsono Sumarsono; Nurcahyani Dewi Retnowati
Compiler Vol 3, No 1 (2014): Mei
Publisher : Institut Teknologi Dirgantara Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (276.094 KB) | DOI: 10.28989/compiler.v3i1.60

Abstract

The lack of information in the area Karanganyar especially the schools are the usual information accessible online . In the era of information technology , as now, it should be information about the school ,information about the schools that are managed and published through the Internet . Some existing sites and information support the schools in the area tends to be static . The information displayed tended outdated information and even out -of -date , not updated in quite a long period of time . Then create a mapping application Senior High School Case Study Karangnyar District . With the application of Mapping Mash-up Senior High School In Karanganyar , the user can see the schools without having to come to school to see school information desired . To make the application Mapping Mash-up Senior High School In Karanganyar JSON format which utilizes lighter and then made accessible to the web service . Results of experiments performed as expected ie when the user opens a web service can simply select senior high school or vocational high school category and public or private category so people can see the information on each school were selected.
SISTEM PENDUKUNG KEPUTUSAN UNTUK MENENTUKAN LOKASI PETERNAKAN AYAM BROILER DENGAN METODE PERBANDINGAN EKSPONENSIAL DAN NAIVE BAYES Ari Wibowo; Anton Setiawan Honggowibowo
Compiler Vol 3, No 2 (2014): November
Publisher : Institut Teknologi Dirgantara Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (158.513 KB) | DOI: 10.28989/compiler.v3i2.77

Abstract

Location is an important role in the success of building a broiler chicken farm. Fault location can be fatal in business continuity. Decision support system is very useful to help help determine the location of broiler chicken farms right. By using the decision support system will give results in the form of value that can be used as a comparison to any alternative location. The method used is Metode Perbandingan Eksponensial (MPE) and Naive Bayes. By using both methods can provide clearer results. Metode Perbandingan Eksponensial is better than the Naive Bayes method, this is because the value generated by the Metode Perbandingan Eksponensial has a contrasting difference in each outcome so as to reduce the refraction that may occur.
PENERAPAN PEMROSESAN PARALEL UNTUK MENGUJI WAKTU RENDERING DESIGN WEB DENGAN FRAMEWORK TERHADAP PROCESSOR MELALUI LAN, ROUTER DAN EKSTRANET Ngadiyono Ngadiyono; Hero Wintolo
Compiler Vol 4, No 1 (2015): Mei
Publisher : Institut Teknologi Dirgantara Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (154.777 KB) | DOI: 10.28989/compiler.v4i1.88

Abstract

Designing a website is the first step to build website that gives the appearance of an interface to the website visitor. the appearence web design that interesting can be gived conveniences for visitors to browse the contents of any website content. designing of the website, skill are required several to be master multiple web programming languages, the programming language areĀ  HTML, CSS and Javascript. In the overall control of the programming language takes time to be master and understand each other codes. Therefore, to built application that allows users to create a website design. This application is called WebEditor is built using CodeIgniter and Twitter Bootstrap framework. In the rendering process design needed parallel processing techniques to the process. so, the impact in terms of rendering time speed to website design. Throughout this system, users can design a website easily and quickly, and in the process of rendering design does not require for long time. the results of study case have done that it can be seen that influences of the implementation of rendering speed transmission media based on the number of processors and computers server. The percentage of the speed to rendering of design does not using a grid server on the LAN network are 33.7 %, 33.3 % and internet routers 33 %. While using a part of grid servers on the LAN network are 33.6 %, 33.4 % and internet routers 33 % and the final grid using 2 servers on the LAN network are 44 %, 33 % and internet routers 26 %. So the highest rendering speed on the LAN router network for further 44 % and 30 % at the latest on the Internet 26 % by using 2 part of grid servers. Thus rendering the best in the website design is using LAN with 2 part of grid servers.
AUTOMATISASI PENENTUAN JALUR KONEKSI INTERNET PADA TIGA PROVIDER Galih Dwi Wicaksono; Haruno Sajati; Dwi Nugraheny
Compiler Vol 5, No 1 (2016): Mei
Publisher : Institut Teknologi Dirgantara Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (179.467 KB) | DOI: 10.28989/compiler.v5i1.104

Abstract

Along with the times, the computer network has undergone many changes from time to time. Eventually, internet network is known. To test the reachability of a host on an IP address (internet protocol) network and to measure the round-trip time for messages sent from the host to the destination, computer needs to perform ping process. Ping operates by sending ICMP (Internet Control Message Protocol) echo request packets to the target host and waiting for an ICMP response. internet connection lane determination automation uses three providers done by comparing the smallest average value of the result of the ping. The test results are printed in the form of a statistical summary of the response packets received, including the minimum, maximum and average round-trip time. The signal strength is not directly proportional to the value of average, because the signal strength is affected by the report the data RSCP, throughput and quality of services covering CSSR (Call Setup Success Ratio), CCSR (Call Completion Success Ratio), DCR (Dropped Call Ratio) and BCR (Blocked Call Ratio) which can be used to optimize the network.
SISTEM PAKAR UNTUK MENDIAGNOSA PENYAKIT DAN HAMA PADA TANAMAN SALAK DI TURI SLEMAN Anton Setiawan Honggowibowo; Asih Pujiastuti; Linda Putri Susanti
Compiler Vol 6, No 1 (2017): Mei
Publisher : Institut Teknologi Dirgantara Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (613.856 KB) | DOI: 10.28989/compiler.v6i1.200

Abstract

Expert systems are systems that adopt human knowledge into computers designed to solve problems like an expert. Salak plants, especially in TuriSleman Yogyakarta area has several obstacles such as diseases and pests in salak plants which is a problem for salak farmers. Expert research Expert system to diagnose diseases and pests in this salak crop helps salak farmers overcome the problems of disease and pests. Salak farmers only need to enter the symptoms experienced in the barking plants later data will be processed symptoms entered by the system. This application performs checks with the system as consulted with a salak plant experts to find out the diseases and pests that attack on the barking plants and find solutions. Implementation in this application using TOPSIS method, TOPSIS method yields the highest rank value for the final result value. This application takes data and performs testing in UPT BP4 Region V Sleman with Turi OPT (Plant-disturbing organisms) officer.
PENGEMBANGAN MODEL TRANSPORTASI SEIMBANG (BALANCE) DENGAN MODIFIED DISTRIBUTION (MODI) DENGAN ORDO 5X5 BERBASIS ANDROID Yuliani Indrianingsih; Dwi Nugraheny; Dwi Andhika Putra
Compiler Vol 6, No 2 (2017): November
Publisher : Institut Teknologi Dirgantara Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (745.526 KB) | DOI: 10.28989/compiler.v6i2.227

Abstract

The absence of rapid examination technique to study transportation model using Modified Distribution often learning process become less efficient and effective. To use Modified Distribution (MODI), the first must to found the first solution of transportation model. To find the first solution of this transportation model using Northwest Corner method then find optimum solution with Modified Distribution (MODI) method. Before that Modified Distribution method had built to application on desktop with [9], but it just to calculate optimum solution to find minimum cost of transportation model on matrix 3X3. On application have some suggestion for developer who want to develop it, like to change user interface to be interesting, expand matrix to m X n (for example 5X5) and add some study case in application to guide user to done case of Operation Research to calculate optimum solution to find minimum cost on transportation model using Modified Distribution (MODI) method in the class. In this essay will be develop an application Modified Distribution (MODI) using Northwest Corner method to calculateĀ  first solution and Modified Distribution (MODI) to calculate optimum solution with matrix 5X5 which implemented on android in operating system minimum API 15: Android 4.0.3 (Ice Cream Sandwich). Application Modified Distribution (MODI) have interesting interface, give easy to access information, and get accurate results, this is established from testing with score average 83,77%.
PENERAPAN SEO (SEARCH ENGINE OPTIMIZATION) MENGGUNAKAN TEKNIK TOGETHER IN A SINGLE CONNECTION (TSC) DALAM MENINGKATKAN KUNJUNGAN PADA SEBUAH BLOG Devia Tito Setyaningsih; Hero Wintolo; Dwi Nugraheny
Compiler Vol 1, No 2 (2012): November
Publisher : Institut Teknologi Dirgantara Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (243.293 KB) | DOI: 10.28989/compiler.v1i2.13

Abstract

One of the internet service used by the people of Indonesia is a blog that can be accessed via http://blogspot.com or http://wordpress.com and others. Everyone can use this medium for the purpose of publication of information in the form of text, images, sounds, or video without having to master web programming languages. One of the obstacles a person who has a blog is a way of increasing number of visitors to his blog. In order for many visitors the blog owner needs to understand about SEO (Search Engine Optimization).To allow users to blog in increasing the number of visitors and ranking his blog, they invented a system that utilizes parallel processing techniques and create a new method, named TSC (Together in a Single Connection) to increase the number of visitors, number of pages viewed and ranking.Increase blog traffic system based on parallel processing can improve the effectiveness in increasing traffic to a blog. With this system the blog owner is expected to be easier to rise to visit his blog.
USE VLSM (VARIABLE LENGTH SUBNET MASKING) ANDROID BASED SIMULATOR FOR ADMINISTRATIVE SUPPORT NETWORK Bimio Wahyu Aji; Hero Wintolo; Dwi Nugraheny
Compiler Vol 2, No 1 (2013): Mei
Publisher : Institut Teknologi Dirgantara Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (133.783 KB) | DOI: 10.28989/compiler.v2i1.30

Abstract

Administration o f networking IP addressing especially IP version 4 have a less using IP address for the limited. Through for the using by networking o f services base on TCP/IP addressing, however that can be used VLSM (Variable Length Subnet Masking) method o f subnetting addressing thorough the public area networking to divided IP addressing private it's called as sub network ID or Local Area Network (IP private). Therefore dividing have choose a calculate IP addressing o f VLSM Method used by simulator calculating IP address subnetting. The use o f goal-based subnetting android simulator to facilitate the distribution o f IP within the network administrator by using the simulator VLSM IP subnetting calculations automatically and efficiently. An application that helps administrators in calculating VLSM subnetting IP, to support network administration so that administrators can make solving the network ID into sub-networks. IP results obtained from the simulator, can be tested with VLSM on various internet network service providers obtain a quite optimal for purposes o f network administration.
PENERAPAN HIDS (HOST INTRUSION DETECTION SYSTEM) DALAM MEMBANGUN KONFIGURASI FIREWALL SECARA DINAMIK Alfian Firdaus; Haruno Sajati; Yuliani Indrianingsih
Compiler Vol 2, No 2 (2013): November
Publisher : Institut Teknologi Dirgantara Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (89.028 KB) | DOI: 10.28989/compiler.v2i2.46

Abstract

Development o f information technology and computer networks in particular its services on the one hand facilitate the work of human beings, but as the very widespread use of the internet, the security level of digital data has become more vulnerable to exploitation. The problem arises when the attacks happened on a computer network in a relatively fast, so that an administrator must always keep an eye on the computer network security. Limitations o f an administrator is exactly what underlies thecreation o f a system capable o f detecting and prevention of these attacks, so the time efficiency can be actually implemented. The system is built to prevent attacks on computer networks such as port scanning, ftp, ssh and telnet brute force. This system will analyze the number o f errors that occur on login these services, and makes a decision system if the login error exceeds the tolerance of an administrator. I f the number o f errors exceeds the tolerance, it will automatically create the firewall rules in a very short duration is one minute, so the system is able to prevent the attacks which happened in a very quick time.
SISTEM KEAMANAN JAIL BASH UNTUK MENGAMANKAN AKUN LEGAL DARI KEJAHATAN INTERNET MENGGUNAKAN THC-HYDRA Cakra Aminuddin Hamka; Haruno Sajati; Yuliani Indrianingsih
Compiler Vol 3, No 1 (2014): Mei
Publisher : Institut Teknologi Dirgantara Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (211.103 KB) | DOI: 10.28989/compiler.v3i1.63

Abstract

Along with the development of current technology, making technology is very important in today's life. Security level digital data has become more vulnerable to exploitation, the problem arises when an information technology device was attacked by people who do not want to take a responsible and important data illegally, so the administrator must act quickly to secure important data. Making a data security technology on the internet is very important information. Limitations administrator underlying the creation of a system that is able to detect and defense systems against such attacks is automation, so that it can be applied to data security. The system is built to prevent attacks on computer networks with more specific on THC - Hydra. This system will analyze the number of errors in the log into the database, and if the error exceeds the tolerance rules are made by the administrator. If the error is more than 3 times in one minute, then with automation, the system will create a rule that can imprison users who do not have such access, and access to the prison in the illegal user can not perform such activities on legal access and access to activities conducted illegal user can be recorded on a file and jail.txt. So under any circumstances and not in supervising administrator, the security of other user data will be safe and can not be retrieved or viewed by a user of illegal access.