Compiler
Jurnal "COMPILER" dengan ISSN Cetak : 2252-3839 dan ISSN On Line 2549-2403 adalah jurnal yang diterbitkan oleh Departement Informatika Sekolah Tinggi Teknologi Adisutjipto Yogyakarta. Jurnal ini memuat artikel yang merupakan hasil-hasil penelitian dengan bidang kajian Struktur Diskrit, Ilmu Komputasi , Algoritma dan Kompleksitas, Bahasa Pemrograman, Sistem Cerdas, Rekayasa Perangkat Lunak, Manajemen Informasi, Dasar-dasar Pengembangan Perangkat Lunak, Interaksi Manusia-Komputer, Pengembangan Berbasis Platform, Arsitektur dan Organisasi Komputer, Sistem Operasi, Dasar-dasar Sistem,Penjaminan dan Keamanan Informasi, Grafis dan Visualisasi, Komputasi Paralel dan Terdistribusi, Jaringan dan Komunikasi, Desain, Animasi dan Simulasi Pesawat Terbang. Compiler terbit setiap bulan Mei dan November.
Articles
423 Documents
LAYANAN CLOUD COMPUTING BERBASIS INFRASTRUCTURE AS A SERVICE MENGGUNAKAN ANDROID
Wintolo, Hero;
Dwi Paradita, Lalu Septian
Compiler Vol 4, No 2 (2015): November
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (168.669 KB)
Cloud computing, one form of information technologies are widely used in the field of computer networks or the Internet. Cloud computing consists of computer hardware, computer networking devices, and computer software, the cloud computing there are three services provided include (SaaS) Software as a Service (PaaS) Platform as a Service, and (IaaS) Infrastructure as a Service. Application cloud computing services in the wake of this system is a service-based data storage infrastructure as a service by using android smartphone as a storage medium, which utilizes FTP Server which is already available on the smartphone. This certainly supports the easy storage of data that utilize various types of internal and external storage on smartphones that serves as a storage server. In addition to the functions of storage available, this service can accommodate streaming function .mp3 file type. Implementation result of the system can be implemented on a local network using a wireless LAN. In addition, the results of user testing using Likert method shows the application can run and function properly
APLIKASI SKETSA GAMBAR DAN TULISAN PADA VIDEO CALL BERBASIS ANDROID
Honggowibowo, Anton Setiawan;
Pujiastuti, Asih;
Saputra, Vendy Yuda
Compiler Vol 6, No 1 (2017): Mei
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (571.508 KB)
Video Call is a set of interactive telecommunication technologies which allow two parties of people in different locations can interact via two-way delivery of audio and video in real time. Tools to sketch pictures and writings on the application ViCall aims to facilitate educators do the learning process using media with video call implementation sketch pictures and writings as explanatory. Educators start doing sketches image and writings and then saved. After that upload sketches image and writings made by educators can then be shown to the students. The results of the testing of the application can be run on at least speksifikasi android kitkat v4.4.4. On testing provider obtained the average connection time 8.33 seconds. Based on a questionnaire, test this application generates 84.4% by criteria of "very good".
PENERAPAN SISTEM KEAMANAN DENGAN KRIPTOGRAFI ADVANCED ENCRYPTION STANDARD (AES) DAN KEY ADMINISTRATOR PADA SINKRONISASI FILE
Qurniawan, Wawan;
Wintolo, Hero;
Nugraheny, Dwi
Compiler Vol 1, No 2 (2012): November
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (213.077 KB)
File synchronization is the process of homogenization or adjustment between one file at a location with other files in the event that a change to be used up and running in a system. File synchronization is generally a process of data exchange in order to have the same amount of data. To maintain the confidentiality of the data necessary to maintain services for data security. The use of cryptographic AES (Advanced Encryption Standard) to encrypt the file and combined with the administrator as an authentication key in making additions or changes to the file is a security system that can be applied to synchronize the files so that data confidentiality will be maintained. The results of the implementation of file synchronization application by applying the AES cryptography and key administrators who carried on the local network and the Internet as a service application data synchronization between the user and the service back-up data as manual handling if storage was damaged and can avoid the theft of data from a file synchronized.
PENERAPAN SISTEM TERDISTRIBUSI PADA TOGETHER IN A SINGLE CONNECTION (TSC) BERBASIS WEB
Zuliana, Zuliana;
Wintolo, Hero;
Sudibya, Bambang
Compiler Vol 2, No 2 (2013): November
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (142.647 KB)
Distributed system is a computer networking technology which can be hardware or software. In hardware distributed system by a collection of computers that are heterogeneous, being in the software system is distributed in the form of software that connects two applications in the form of client and server side. TSC method is a method that already existed before, which can be used increase the ranking o f a blog. Implementation distributed system for TSC using landing page as the intermediary. Landing page serves as a liaison between web applications or blogs are listed as a member to raise the ranking of a database on the application server side. When someone does click on landing page seoindonesia, will open a blog or other web members. Landing page so it can be used as a way to count the number of visitors to a blog or website, which in turn can increase the number o f page visits and 1 with 1 clickbutton seoindonesia for test in histats.com.
PERANCANGAN GAME FLIGHT SIMULATOR N219 YANG DIKENDALIKAN DENGAN PERANGKAT SMARTPHONE ANDROID MELALUI MEDIA WI- FI
Hidayat, Ariska;
Adiputra, Bangga Dirgantara
Compiler Vol 4, No 1 (2015): Mei
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (136.839 KB)
Flight simulation games are generally played on a smartphone or desktop computer. But still there is rarely flight simulation game that combines these two devices simultaneously with each other in a game. Software on a desktop computer that was developed in this research is to fly a plane from take off to landing at controlled by android smartphones using the accelerometer and touch sensors. The aircraft used for flight simulation games are made by PT. Digantara Indonesia, N219. The result of this design is only intended as a study course.
RANCANG BANGUN WEB REPLIKA PADA WEBSITE E-COMMERCE
Gita Purnama Putri, Baiq Dinasti;
Honggowibowo, Anton Setiawan;
Kusumaningrum, Anggraini
Compiler Vol 5, No 2 (2016): November
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (201.33 KB)
|
DOI: 10.28989/compiler.v5i2.173
E-commerce or electronic commerce is an activity related to the purchase, sale, marketing of goods or services by using electronic systems such as the Internet or a computer network as a medium. In its development, e-commerce website has a lot of models and concepts, one of which is a replica website. Replica website is a reflection of the website host website itself. Website replica would be obtained if it had been making purchases on the website o f the parent (stta.name:8000) or web replica owned by a member (stta.name:8000/ sponsor=namaanggota). If you already have a replica website then the owner can sell online using the web replica, and can change the prices ofgoods as well as web background replicas. Besides being able to change the price and the background, a replica web owners are also entitled to a bonus from the purchase o f its products downline level 1. For the award is the excess of the price that has been modified with an initial price of a web master or web links above. From the calculation o f the questionnaire that was distributed to 30 respondents, the result of testing knowledge of web replica of 42.7% based on the assessment interval is Enough and application usage by 78.5%, which means Good.
SISTEM PENDUKUNG KEPUTUSAN UNTUK MENENTUKAN POSISI PEMAIN IDEAL DALAM TIM SEPAK BOLA DENGAN METODE ALGORITMA GENETIKA
Alprianta, Hizkia;
Honggowibowo, Anton Setiawan;
Indrianingsih, Yuliani
Compiler Vol 1, No 2 (2012): November
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (174.436 KB)
So far, there are coaches who are less precise in determining the ideal position of the player as it only relies on instinct and the ego of the players so that there is still a coach who has not been able to objectively assess the players.By utilizing the method of Genetic Algorithm as Decision Support System (DSS) in the process of determining the ideal position of a player who uses several criteria (multicriteria) to choose a proper player. DSS is helping coach in making the right decisions and Genetic Algorithm is used as a model for multicriteria weighting in the selection process. This application was built with tools Borland Delphi (7.0) as the user interface design and media processing PostgreSQL as its database. Based on these results we can conclude that this application expected to assist the coaches in the decision making process and can change the appraisal of which are subjective to more objective, to determine the ideal position for a player, can determine the best position of each position of a number of players and the expected results of the Genetic Algorithm on the system constructed in accordance with the results of manual calculations.
PEMANFAATAN INTRUSION DETECTION SYSTEM (IDS) SEBAGAI OTOMATISASI KONFIGURASI FIREWALL BERBASIS WEB SERVICE MENGGUNAKAN ARSITEKTUR REPRESENTATIONAL STATE TRANSFER (REST)
Awangga, Demmy Nanda;
Sajati, Haruno;
Astuti, Yenni
Compiler Vol 2, No 2 (2013): November
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (300.762 KB)
Many things can destabilize a computer network connections, both with regard to hardware and software. Therefore, we need a technique for network security, one of them is firewall. The problems that arise in this final project is to build a linux based firewall automation application via web service by using REST (Representational State Transfer) architecture and IDS (Intrusion Detection System). The system buid firewall rules using linux operating system with the help o f 2 pieces o f IDS to detect theactivities of traffic data between the intruder and the server that will be recorded in the IDS database. The system will compare the server with IDS on the router to get the IP address o f the actual intruders, so it will be blocked by the firewall. The applications is used to prevents the ping o f death attack usingweb service and REST protocol so that firewall rules will run automatically.
SISTEM PAKAR PADA PERMAINAN UNTUK MENGUKUR TINGKAT INTELLIGENCE QUOTIENT (IQ) MENGGUNAKAN METODE BINET-SIMON BERBASIS ANDROID
Tamatjita, E.N.;
Irawaty, Mardiana;
Ramdhani, Rio
Compiler Vol 5, No 1 (2016): Mei
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (176.332 KB)
The development of mobile technologies very rapidly at this time, can be seen in all areas of human life. It triggers the level of usage of mobile equipment itself, this time in the form of a smartphone gadgets familiar to the adults and children. IQ tests that exist today are still many that are manual and less desirable, especially for the children. With combined by mobile technology and packed into a game, is expected to add to the child's interest and can be used as a means of learning. The test results of 30 respondents, the level of user satisfaction based GUI Display, User Friendly and Final Game IQ Method Using Binet-Simon-Based Mobile, obtained a percentage of 71.31% keselurahan assessment. Thus Game IQ can be said Good
NOTIFICATION OF SECURITY THREATS ON THE INTERNET PROXY SERVER IS A SERVER-BASED SHORT MESSAGE SERVICE (SMS )
Arizald Gobel, Mario Agapito;
Sumarsono, Sumarsono;
Indrianingsih, Yuliani
Compiler Vol 1, No 1 (2012): Mei
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (655.424 KB)
Defense system against interference when the activity is generally done manually by the administrator. This resulted in the integrity of the system depends on the availability and speed of the administrator in response to disturbance. In the current era of information technology, almost all information is important for an institution can be accessed by its users. Disclosure of such access raises new security issues in part of a computer network system that is very important to maintain the validity and integrity of data and ensure availability of services for its users.In this issue then designed a system to detect any interference. The detection is based filtering on the port service, using the programming language Delphi 7. The data obtained from the filtered traffic data packets passing the proxy server. By building a system that can work automatically and in real time, then perform the detection of intruders or illegal activities which will then be reported to the administrator.With this administrator can find out the use of illegal ports through port filter techniques on the traffic data service in and out in real time, from both internal and external networks. Administrators can do the monitoring without having to depend on availability. With such a system administrator can perform tasks more efficiently in maintaining the validity and integrity of data.