cover
Contact Name
Hero Wintolo
Contact Email
herowintolo@stta.ac.id
Phone
-
Journal Mail Official
informatika@stta.ac.id
Editorial Address
-
Location
Kab. bantul,
Daerah istimewa yogyakarta
INDONESIA
Compiler
ISSN : 22523839     EISSN : 25492403     DOI : 10.28989/compiler
Core Subject : Science,
Jurnal "COMPILER" dengan ISSN Cetak : 2252-3839 dan ISSN On Line 2549-2403 adalah jurnal yang diterbitkan oleh Departement Informatika Sekolah Tinggi Teknologi Adisutjipto Yogyakarta. Jurnal ini memuat artikel yang merupakan hasil-hasil penelitian dengan bidang kajian Struktur Diskrit, Ilmu Komputasi , Algoritma dan Kompleksitas, Bahasa Pemrograman, Sistem Cerdas, Rekayasa Perangkat Lunak, Manajemen Informasi, Dasar-dasar Pengembangan Perangkat Lunak, Interaksi Manusia-Komputer, Pengembangan Berbasis Platform, Arsitektur dan Organisasi Komputer, Sistem Operasi, Dasar-dasar Sistem,Penjaminan dan Keamanan Informasi, Grafis dan Visualisasi, Komputasi Paralel dan Terdistribusi, Jaringan dan Komunikasi, Desain, Animasi dan Simulasi Pesawat Terbang. Compiler terbit setiap bulan Mei dan November.
Arjuna Subject : -
Articles 423 Documents
Arc Circularitie Naive Bayes for Occupational Safety Helmet Detection Rizaldi, Taufiq; Putranto, Hermawan Arief
Compiler Vol 12, No 2 (2023): November
Publisher : Institut Teknologi Dirgantara Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.28989/compiler.v12i2.1760

Abstract

Occupational Safety and Health (OHS) is an effort to guarantee and protect the safety and health of every worker through efforts to prevent work accidents and work-related diseases. Safety Helmet is one of the components that must exist and be used in accordance with Occupational Safety and Health standards. Detection of safety helmets usage is one of the efforts to support these activities. The application of Arc Circularity Naive Bayes is used to detect whether an object meets the ratio of a circle by utilizing RGB and HSV image filtering and classification using Naïve Bayes. That method is used to detect whether a worker uses a safety helmet or not, it also detects helm color. The average value of accuracy is 50.8, precision is 58.3%, recall is 66.0%, and f1-score is 59.5% which are calculated using the Confusion Matrix
Morphological Study of The Liliba River Utilizing Remote Sensing System Anmuni, Avilla Martha; Loden, Onisius; Rafael, Jusuf Wilson Meynerd
Compiler Vol 13, No 1 (2024): May
Publisher : Institut Teknologi Dirgantara Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.28989/compiler.v13i1.2114

Abstract

The branch of natural sciences called river morphology focuses on the study of the characteristics and dynamics of rivers, including their structure, classification, and changes on spatial and temporal scales. Two main factors influence river configurations. The first is natural factors, such as floods and landslides, and the second is human factors, such as human activities that alter river morphology. Cyclone Seroja caused landslides on the banks of the Liliba River in Kupang, East Nusa Tenggara in April 2022. This mainly occurred at Naimata Bridge in Liliba Village, Oebobo District. River geometry, especially the channel and bed elevation, can be significantly influenced by landslides occurring on the riverbanks. Therefore, a study of the morphology of the Liliba River was conducted using remote sensing systems. To conduct a detailed analysis, this study incorporated these photos. In this review, changes in the river channel were examined by extracting the river's course from Landsat image data. From 2009 to 2022, the Liliba River experienced an average shift of 1.60 meters westward and eastward. The research results indicate the need for reforestation along the riverbanks, and residents should be encouraged to reduce the disposal of plastic waste into the river. Future research should also further investigate the geological characteristics of the Liliba River, such as rock types, and conduct hydrological analyses to comprehensively understand the factors influencing changes in the riverbed.
Recommendation System for Clustering to Allocate Classes for New Students Using The K-Means Method Ariyanto, Yuri; Sabilla, Wilda Imama; As Sidiq, Zidan Shabira
Compiler Vol 13, No 1 (2024): May
Publisher : Institut Teknologi Dirgantara Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.28989/compiler.v13i1.1962

Abstract

SMAN 1 Durenan has a plan to organize the allocation of classes for new students using a system to achieve practical and efficient student grouping. The reason for implementing this class allocation system is SMAN 1 Durenan aims to create a new system to process student data for class allocation according to specific needs. This research involves the development of a Recommendation System for Clustering to Allocate Classes for New Students using the K-Means method. The system processes data of newly enrolled students at SMAN 1 Durenan based on specific attributes. The results of this student data processing serve as considerations and references for SMAN 1 Durenan to perform class allocation as needed. The analysis in this research utilizes the K-Means method to obtain data clusters that maximize the similarity of characteristics within each group and maximize the differences between the collections created. The developed recommendation system website provides information about the student data clustering results from the K-Means process at SMAN 1 Durenan.
Recognition of Hand Gestures Using Image with Histogram Feature Extraction and Euclidean Distance Classification Method Astuti, Yenni; Sudaryanto, Sudaryanto; Ariyanti, Indah Dwi
Compiler Vol 13, No 2 (2024): November
Publisher : Institut Teknologi Dirgantara Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.28989/compiler.v13i2.2640

Abstract

Human-Computer Interaction technology allows humans to communicate with computers using natural language such as gestures. One of the gestures used by humans to communicate is hand gestures. In this research, hand gestures are recognized using images that represent pitch, roll, and yaw movement. As a feature extraction method, the histogram is used, while the classification method used is the Euclidean distance. From the experimental results, the combination of the histogram feature extraction method and the Euclidean distance classification method had an accuracy of 30 percent for images representing pitch and yaw movements, and 60 percent for images representing roll movements.
Improving the Accuracy of Batik Classification using Deep Convolutional Auto Encoder Dzulqarnain, Muhammad Faqih; Fadlil, Abdul; Riadi, Imam
Compiler Vol 13, No 2 (2024): November
Publisher : Institut Teknologi Dirgantara Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.28989/compiler.v13i2.2649

Abstract

This research investigates the development of model deep convolutional autoencoders to enhance the classification of digital batik images. The dataset used was sourced from Kaggle. The autoencoder was employed to enrich the image data prior to convolutional processing. By forcing the autoencoder to learn a lower-dimensional latent representation that captures the most salient features of the batik patterns. The performance of this enhanced model was compared against a standard convolutional neural network (CNN) without the autoencoder. Experimental results demonstrate that the incorporation of the autoencoder significantly improved the classification accuracy, achieving 99% accuracy on the testing data and loss value of 3.4%. This study highlights the potential of deep convolutional autoencoders as a powerful tool for augmenting image data and improving the performance of deep learning models in the context of batik image classification.
Passenger Queue Simulation Analysis and Optimization at The Check-in Counter of Yogyakarta International Airport Putra, Ananda Adhitya; Rahmawati, Fajar Khanif; Mulyani, Sri; Kusumaningrum, Maria Asumpta Deny; Gunawan, Gunawan; Medianto, Rully
Compiler Vol 13, No 2 (2024): November
Publisher : Institut Teknologi Dirgantara Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.28989/compiler.v13i2.2653

Abstract

Air transportation has a role in providing services to deliver people and goods in a relatively shorter time. Queues will increase due to the relatively low quality and quantity of service. This can happen at the Yogyakarta International Airport check-in counter. This research uses a comparison method between the queuing system and arena software. The queuing system used is a single channel-single phase.  The airlines that will be studied are Lion Air and Super Air Jet. The samples used respectively were 65 passengers and 61 passengers from Lion Air and Super Air Jet airlines. Data collection was carried out during peak hours. With this passenger movement simulation model, it is possible to determine the length of queue experienced by passengers at each check-in counter, the time to be served, and the check-in counter staff that must be provided. The length of time queuing for passengers for each airline is that for Lion Air the length of time queuing at the check-in counter is 18,6 minutes with an additional 1 officer from before and for Super Air Jet it is 28,5 minutes with an additional 1 officer from the previous check-in counter.
Systematic Literature Review on Cybersecurity Issues in the Smart Home Environment Fauzi, Rofiq; Candra Wulan, Puspa Ira Dewi; Perdana, Danis Putra
Compiler Vol 13, No 2 (2024): November
Publisher : Institut Teknologi Dirgantara Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.28989/compiler.v13i2.2118

Abstract

Method A literature study was conducted to examine cyber security in Smart Homes, focusing on vulnerability assessment, privacy, threat mitigation, and policy regulations. Not only smartphones have advanced technology, but smarthomes or smart homes are a technological development that allows users to control functions such as security access, temperature, lighting and home theater remotely. This is the basis for the need for user-friendly cybersecurity measures, considering the rapid adoption of IoT devices in smart homes. This literature review highlights challenges related to inconsistent regulations and varying technology standards. Significant gaps exist in user awareness, device interoperability, data privacy, and security protocols. A multidisciplinary approach that brings together technology, policy, and social science stakeholders is recommended to build a secure, efficient, and privacy-preserving smart home ecosystem
Application of Simple Additive Weighting Method for Decision Making for Scholarship Recipients at SMA Angkasa Adisutjipto Yogyakarta Indrianingsih, Yuliani; Pujiastuti, Asih; Mauidzhoh, Uyuunul; Leo, Muhammad; Nuryatno, Edi Triono
Compiler Vol 13, No 2 (2024): November
Publisher : Institut Teknologi Dirgantara Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.28989/compiler.v13i2.2660

Abstract

The SMA Angkasa Adisucipto Yogyakarta scholarship selection process requires an effective and objective approach to ensure that scholarships are awarded to students who meet the relevant criteria. The purpose of this study is to apply the Simple Weighting (SAW) method as a decision support in selecting scholarship recipients. The SAW technique was chosen because it allows for weighting calculations, allowing for a more systematic analysis of the criteria. The criteria used include student academic performance, attendance, behavior, and financial situation, each of which is weighted according to its importance. Eligible student data is processed using the SAW method to determine the final preference score, which is then used to rank prospective scholarship recipients. The results of the study indicate that the SAW method can make accurate and transparent decisions in selecting scholarship recipients. The application of the SAW method not only increases the efficiency of selection, but also reduces the subjectivity that occurs in the evaluation. In summary, the SAW method is very suitable as a decision-making tool based on various criteria, especially in selecting grant recipients.
Web-based Panggung Lestari Village-Owned Enterprises (BUMDES) Integrated Service Information System Fidiantoro, Vicky; Rianto, Rianto; Putri, Puji Handayani
Compiler Vol 13, No 2 (2024): November
Publisher : Institut Teknologi Dirgantara Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.28989/compiler.v13i2.2590

Abstract

Village-Owned Enterprises (BUMDes) are village business institutions whose businesses are run by village communities and the village government to improve village welfare. BUMDes was formed as a business institution that can manage various businesses according to the needs and potential of the village. However, BUMDes face challenges in managing their business, such as recording transactions and reports. This research is to design and implement a website-based BUMDes integrated service information system at BUMDes Panggung Lestari. This system design uses a programming language PHP with framework codeigniter and database MySQL. The system development method used is SDLC (System Development Life Cycle) model waterfall. The web-based BUMDes integrated service information system is very effective and efficient used by BUMDes for managing, monitoring and supervising business activities. This system is designed to include features for recording income transactions or business operational costs, as well as providing reports that can be used for analysis and evaluation of operational performance, and providing information services to the public regarding information about BUMDes.
Comparative Analysis of Nextcloud and Owncloud Performance as Infrastructure as a Service (IaaS) Based Cloud Storage Haryani, Prita; Ariyana, Renna Yanwastika; Majid, Iqbal Abdul; Susanto, Fx. Guntur Putra
Compiler Vol 13, No 2 (2024): November
Publisher : Institut Teknologi Dirgantara Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.28989/compiler.v13i2.2667

Abstract

Physical data storage using flash drives or local computer storage continues to be used for document archiving in database laboratories. Archived documents include laboratory inventory modules, practical course modules, practitioners' attendance cards, and students' task and response files. Utilizing cloud storage has emerged as a solution to these issues, enabling data to be easily accessed from anywhere via an internet connection. Numerous cloud storage applications now feature advanced functionalities; however, each cloud storage company varies regarding access speed, storage capacity, security, and costs. This study aims to analyze the performance of two cloud storage applications, Nextcloud and Owncloud, using throughput as a parameter. Test results demonstrated that Nextcloud's performance in file upload throughput was higher at 1065 bps compared to Owncloud's 850 bps. Similarly, in file download throughput, Nextcloud exceeded Owncloud's throughput of 2960 bps against 2564 bps. These results indicate that Nextcloud's performance surpasses Owncloud's in both file upload and download operations