cover
Contact Name
Hero Wintolo
Contact Email
herowintolo@stta.ac.id
Phone
-
Journal Mail Official
informatika@stta.ac.id
Editorial Address
-
Location
Kab. bantul,
Daerah istimewa yogyakarta
INDONESIA
Compiler
ISSN : 22523839     EISSN : 25492403     DOI : 10.28989/compiler
Core Subject : Science,
Jurnal "COMPILER" dengan ISSN Cetak : 2252-3839 dan ISSN On Line 2549-2403 adalah jurnal yang diterbitkan oleh Departement Informatika Sekolah Tinggi Teknologi Adisutjipto Yogyakarta. Jurnal ini memuat artikel yang merupakan hasil-hasil penelitian dengan bidang kajian Struktur Diskrit, Ilmu Komputasi , Algoritma dan Kompleksitas, Bahasa Pemrograman, Sistem Cerdas, Rekayasa Perangkat Lunak, Manajemen Informasi, Dasar-dasar Pengembangan Perangkat Lunak, Interaksi Manusia-Komputer, Pengembangan Berbasis Platform, Arsitektur dan Organisasi Komputer, Sistem Operasi, Dasar-dasar Sistem,Penjaminan dan Keamanan Informasi, Grafis dan Visualisasi, Komputasi Paralel dan Terdistribusi, Jaringan dan Komunikasi, Desain, Animasi dan Simulasi Pesawat Terbang. Compiler terbit setiap bulan Mei dan November.
Arjuna Subject : -
Articles 423 Documents
ANALISA PERBANDINGAN BREADTH-FIRST SEARCH DAN DEPTHFIRST SEARCH PADA APLIKASI SISTEM PAKAR PENGOBATAN TRADISIONAL Irisma Ifrisma; Anton Setiawan Honggowibowo; Nurcahyani Dewi Retnowati
Compiler Vol 2, No 2 (2013): November
Publisher : Institut Teknologi Dirgantara Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (355.95 KB) | DOI: 10.28989/compiler.v2i2.45

Abstract

This research was conducted based on the need for tools for parents who have had children in determining a traditional medicine to treat illnesses suffered by children, toddlers and babies. Aids in the fo rm o f an expert system of traditional medicine. This expert system application can be run in a way that the disease name input experienced by children, toddlersand babies, then the expert system will provide information prescription medications to treat the disease. Search method used is the method of Breadth-First Search and Depth-First Search. Results of comparative analysis o f Breadth-First Search and Depth-First Search was concluded that the analysis using the Depth-First Search more quickly provide information about traditional medicine in comparison with using the method of Breadth-First Search. However, the use of the method of Breadth-First Search is superior compared with Depth-FirstSearch. This is because the method of Breadth-First Search will not find a dead end or to find a solution although it has only one solution. And if you have two solutions, the method of Breadth-First Search will find them. The test results of the application of expert system of traditional medicine in the 30 responders was 72.67%. Thus, the application of expert systemof traditional medicine by using Breadth-First Search and Depth-First S earch good.
BANDWIDTH MANAGEMENT TO SET OF INTERNET CONNECTION REFERING FROM STRUCTURAL POSITION USE MIKROTIK RB751-2HnD WITH WEB BASED IN ADISUTJIPTO HIGH SCHOOL TECHNOLOGY Brama Ady Sulistiyo; Haruno Sajati; Elizabeth Nurmiyati Tamatjita
Compiler Vol 3, No 1 (2014): Mei
Publisher : Institut Teknologi Dirgantara Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (110.924 KB) | DOI: 10.28989/compiler.v3i1.62

Abstract

Development of information technology and computer networks in particular its services on the one hand facilitate the work of human beings, but as a very widespread internet usage, internet access usage levels become unmanageable. The need for a web-based application that facilitates an admin to manage the bandwidth seems very necessary. By using or utilizing the API (application programming interface) that has been provided by the router is to create a Bandwidth Management Application To Set Internet Connection Referring Structural Position Use Mikrotik RB751G - 2HnD With Web Based In Adisutjipto Technology High School. The results Application test show and prove that bandwidth isn’t right as the transfer rate. As for transfer rate or download speed is not affected by bandwidth rather influenced by the size distribution of the bandwidth paths. Test results also proved that a bandwidth leased from a provider not in accordance with the offer.
SISTEM PENDUKUNG KEPUTUSAN PENERIMAAN ANGGOTA HIMPUNAN MAHASISWA JURUSAN TEKNIK INFORMATIKA DENGAN MENGGUNAKAN METODE ELECTRE (Studi Kasus : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta) Diana Corry; Yuliani Indrianingsih
Compiler Vol 3, No 2 (2014): November
Publisher : Institut Teknologi Dirgantara Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (145.048 KB) | DOI: 10.28989/compiler.v3i2.78

Abstract

Himpunan Mahasiswa Jurusan (HMJ) is a student organization in the majors at the college level. HMJ Informatics is one of the HMJ on Sekolah Tinggi Teknologi Adisutjipto Yogyakarta. HMJ certainly has a vision and mission, therefore, to realize the vision and mission of the members is required in accordance with the criteria expected. There are several criteria for determining the decision-making division members HMJ. Criteria include interest, liveliness, confidence, psychology and CPI (Cumulative Performance Index). To resolve the issue it was made of Decision Support Systems (DSS) recruitment of HMJ division members using the method Elimination and Choice Expressing Reality (ELECTRE). The existences of these systems provide convenience to head of the HMJ to determine HMJ members. The system is built using the programming language Delphi 7 and Oracle databases. Based on calculations by the ELECTRE method obtained ranking prospective members. Taken example, 4 students applying to become a member of HMJ. Calculation shows Gilar Prakoso get ranked first by the number of assessment 4 percentage 80%, Koko Wiyono second ranked the number 2 percentage 40% assessment, Linda Putri Susanti third the number of ratings 1 percentage 20%, and Dini Larasati fourth the number of assessment - 7 the percentage of 0%. The calculations revealed that the results of the manual calculation in accordance with the results of the calculation system and can help the chairman HMJ decision in determining who is eligible to become a member.
SISTEM PENDUKUNG KEPUTUSAN PENENTUAN INVESTASI KELAPA SAWIT DENGAN METODE INTERNAL RATE OF RETURN DALAM SATU BLOCK SAWIT DI LINGGA KUAMANG BUNGO JAMBI Bambang Sudibyo; Joko Suismianto
Compiler Vol 4, No 2 (2015): November
Publisher : Institut Teknologi Dirgantara Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (151.833 KB) | DOI: 10.28989/compiler.v4i2.94

Abstract

ABSTRACTTechnology developed in order to facilitate human work that would not be done manually, with the presence of the latest technologies that it is not a work of man may not be done quickly, accurately, and save time. One was for the manufacture of palm data processing applications that provide an overview to the public that it is feasible to plant palm oil or not to do, based on existing data and then recycled into Decision Support Systems. To process these data using the Internal Rate Of Return (IRR) as a method to make decisions based on data that have been processed. In this study processed data is the data of a group of Palm Jl. Salak Linga Kuamang Bungo Jambi. From the results of the data managed by the farmer group Palm block 22, Jalan Salak, Linga Kuamang, with interpolation of 30% per year, with a capital of USD 888,253,000.00 and generate income of Rp 2,063,387,050.00 in if using the Internal rate of Return produce interpolation (I) of 30, 113%. Since IRR> I, then it is worth to continue.
SISTEM PAKAR PADA PERMAINAN UNTUK MENGUKUR TINGKAT INTELLIGENCE QUOTIENT (IQ) MENGGUNAKAN METODE BINET-SIMON BERBASIS ANDROID E.N. Tamatjita; Mardiana Irawaty; Rio Ramdhani
Compiler Vol 5, No 1 (2016): Mei
Publisher : Institut Teknologi Dirgantara Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (176.332 KB) | DOI: 10.28989/compiler.v5i1.105

Abstract

The development of mobile technologies very rapidly at this time, can be seen in all areas of human life. It triggers the level of usage of mobile equipment itself, this time in the form of a smartphone gadgets familiar to the adults and children. IQ tests that exist today are still many that are manual and less desirable, especially for the children. With combined by mobile technology and packed into a game, is expected to add to the child's interest and can be used as a means of learning. The test results of 30 respondents, the level of user satisfaction based GUI Display, User Friendly and Final Game IQ Method Using Binet-Simon-Based Mobile, obtained a percentage of 71.31% keselurahan assessment. Thus Game IQ can be said Good
PEMANFAATAN INTERNET OF THINGS PADA KENDALI LAMPU Anggraini Kusumaningrum; Asih Pujiastuti; Muhammad Zeny
Compiler Vol 6, No 1 (2017): Mei
Publisher : Institut Teknologi Dirgantara Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (762.134 KB) | DOI: 10.28989/compiler.v6i1.201

Abstract

Lamp is a kind of electronic that created light. Light is obtained through the flow of electricity as a current to add a voltage. the die and the life of light are controled  by humans using switch. Applying the  Internet of Things, as known as IoT determined the life and the die of a lamp by determined by the active light censor. The die and the life of the lamp automatically depends on the light sensor by capturing the intensity of the light produced. The result of the function test found that the data in the form of lux value generated by the light sensor, the value is exposed on a website with the display of graphics and websites serve as a web service provides control values to determine the response lamp, if the value of lux above 30 percent then the lights off And vice versa if under 30 percent of the lamps are on, so that a small value will be sent to the lamp and the lamp will respond that the lights are off or on. So that humans only act as a watchdog and control of the value generated by the light sensor.
NOTIFICATION OF SECURITY THREATS ON THE INTERNET PROXY SERVER IS A SERVER-BASED SHORT MESSAGE SERVICE (SMS ) Mario Agapito Arizald Gobel; Sumarsono Sumarsono; Yuliani Indrianingsih
Compiler Vol 1, No 1 (2012): Mei
Publisher : Institut Teknologi Dirgantara Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (655.424 KB) | DOI: 10.28989/compiler.v1i1.7

Abstract

Defense system against interference when the activity is generally done manually by the administrator. This resulted in the integrity of the system depends on the availability and speed of the administrator in response to disturbance. In the current era of information technology, almost all information is important for an institution can be accessed by its users. Disclosure of such access raises new security issues in part of a computer network system that is very important to maintain the validity and integrity of data and ensure availability of services for its users.In this issue then designed a system to detect any interference. The detection is based filtering on the port service, using the programming language Delphi 7. The data obtained from the filtered traffic data packets passing the proxy server. By building a system that can work automatically and in real time, then perform the detection of intruders or illegal activities which will then be reported to the administrator.With this administrator can find out the use of illegal ports through port filter techniques on the traffic data service in and out in real time, from both internal and external networks. Administrators can do the monitoring without having to depend on availability. With such a system administrator can perform tasks more efficiently in maintaining the validity and integrity of data.
MANAJEMEN WEB UNTUK MENDUKUNG APLIKASI INFORMASI PETA DIGITAL PADA SMARTPHONE BERBASIS ANDROID Elihu Setyo Nugroho
Compiler Vol 1, No 2 (2012): November
Publisher : Institut Teknologi Dirgantara Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (466.646 KB) | DOI: 10.28989/compiler.v1i2.23

Abstract

The society with massive schedule in the fully modern life, gives effect of limitation to the society in doing many activities. For example, while taking a trip in a city without knowing the area might cause many troubles. Using location searching in a city using GPS technology which connected to the android smartphone tools, will make it easier and  saving cost, time and energy.             The method of this research for the mapping is using google map  facility. In this application, the data like mesjid, church, market, hotel, restaurant and hospital data is saved in server web which make possible for the user to add new data to the application with verification performed by the administrator.             Smartphone tools which have GPS facility can be used to acknowledge important spot location in a city and the user location at the sam time. This kind of application can be functioned if this smartphone tools with facility GPS has connection with the internet.
IMPLEMENTASI LOAD BALANCING DENGAN METODE BUBBLE SORT STUDI KASUS PENGISIAN KRS DI STTA Rahmad Hidayat; Agus Basukesti; Yuliani Indrianingsih
Compiler Vol 2, No 1 (2013): Mei
Publisher : Institut Teknologi Dirgantara Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (203.588 KB) | DOI: 10.28989/compiler.v2i1.40

Abstract

The increase o f request brings large traffic to networks especially to data centers, large enterprises and portal websites. In addition, server provides more and more information by using applications. Most servers have to provide all-day services, and any service interruption or key data loss in communication will result in business loss. All these require high performance and high reliability on application services. However, the increase of server processing speed and memory access speed is greatly lower than that o f the network bandwidth and applications. In addition, the increase o f network bandwidth makes server resource consumption more serious. Therefore, the servers become the network bottleneck, and the traditional single device mode becomes the network failure point. Load balancing (LB) comes to provide a good solution by providing multiple servers form a server cluster, with each server providing the same or similar services. A load balancing application is managed at the front end o f the server cluster to distribute user requests in the server cluster according to pre-configured load balancing rules, provide services, and maintain the servers. Load balancing bring good advantage such as bring faster application, low cost, the available resources will not be wasted, and no high-end devices are needed for the new resources. It is expandability. When services are increasing, the system can satisfy the needs by adding servers, without affecting the existing services and reducing service quality. Load balancing also has high reliability. When a server fails, the LB application or LB device redistributes user requests to other servers in the same cluster, ensuring uninterrupted services.
PERANCANGAN KEAMANAN SISTEM MENGGUNAKAN ALGORITMA HONEYPOT PADA APLIKASI KRS ONLINE (STUDI KASUS : SEKOLAH TINGGI TEKNOLOGI ADISUTJIPTO) Yoris Setiawan; Haruno Sajati; Bambang Sudibya
Compiler Vol 2, No 2 (2013): November
Publisher : Institut Teknologi Dirgantara Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (160.53 KB) | DOI: 10.28989/compiler.v2i2.56

Abstract

Many colleges already apply web based academic information system use internet connection, so it is need a system security to protect from attacks such as SQL Injection and Brute Force. Honeypot is a system security which devide two system that are original and fake system. Original system used by user to access academic information system that source from correct database. While fake system used to separate hacker and user. Hackers who try to enter with SQL Injection is send to fake system directly which has wrong data. This fake system seems correct and all action that was happened in will be noted on log history. When hacker try some password ese Brute Force, system will reset user password automatically. This system already test with 79 times SQL Injection and 29 times Brute Force attack. All attacks can handle nicely with honeypot algorithm.