cover
Contact Name
Hero Wintolo
Contact Email
herowintolo@stta.ac.id
Phone
-
Journal Mail Official
informatika@stta.ac.id
Editorial Address
-
Location
Kab. bantul,
Daerah istimewa yogyakarta
INDONESIA
Compiler
ISSN : 22523839     EISSN : 25492403     DOI : 10.28989/compiler
Core Subject : Science,
Jurnal "COMPILER" dengan ISSN Cetak : 2252-3839 dan ISSN On Line 2549-2403 adalah jurnal yang diterbitkan oleh Departement Informatika Sekolah Tinggi Teknologi Adisutjipto Yogyakarta. Jurnal ini memuat artikel yang merupakan hasil-hasil penelitian dengan bidang kajian Struktur Diskrit, Ilmu Komputasi , Algoritma dan Kompleksitas, Bahasa Pemrograman, Sistem Cerdas, Rekayasa Perangkat Lunak, Manajemen Informasi, Dasar-dasar Pengembangan Perangkat Lunak, Interaksi Manusia-Komputer, Pengembangan Berbasis Platform, Arsitektur dan Organisasi Komputer, Sistem Operasi, Dasar-dasar Sistem,Penjaminan dan Keamanan Informasi, Grafis dan Visualisasi, Komputasi Paralel dan Terdistribusi, Jaringan dan Komunikasi, Desain, Animasi dan Simulasi Pesawat Terbang. Compiler terbit setiap bulan Mei dan November.
Arjuna Subject : -
Articles 423 Documents
SIMULASI PENGENDALIAN ROUTER MIKROTIK MENGGUNAKAN ANDROID Risaldi, Moh; Ayuningtyas, Astika
Compiler Vol 7, No 1 (2018): Mei
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (684.231 KB) | DOI: 10.28989/compiler.v7i1.284

Abstract

Userman is a tool in mikrotic that serves as a network user. Userman's tools are only accessible by admin and can only be accessed via a computer device. Utilization of handheld or mobile phone device at this time the usual thing because cellular phone or handphone is as companion in carrying out everyday activities. That's what makes Hanphone is very commonplace for some people. This is because some Mobile already has the function and ability more than just the basic function. Android as an operating system that can be embedded in mobile devices have the ability to be installed applications required by the user. In this final project, the mikrotik application can be used to manage the admin that has been in the menu of user management and mikrotik application can also be successful to monitor network traffic and limit the bandwidth to the connected user.
IMPLEMENTASI LOAD BALANCING DENGAN METODE BUBBLE SORT STUDI KASUS PENGISIAN KRS DI STTA Hidayat, Rahmad; Basukesti, Agus; Indrianingsih, Yuliani
Compiler Vol 2, No 1 (2013): Mei
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (203.588 KB)

Abstract

The increase o f request brings large traffic to networks especially to data centers, large enterprises and portal websites. In addition, server provides more and more information by using applications. Most servers have to provide all-day services, and any service interruption or key data loss in communication will result in business loss. All these require high performance and high reliability on application services. However, the increase of server processing speed and memory access speed is greatly lower than that o f the network bandwidth and applications. In addition, the increase o f network bandwidth makes server resource consumption more serious. Therefore, the servers become the network bottleneck, and the traditional single device mode becomes the network failure point. Load balancing (LB) comes to provide a good solution by providing multiple servers form a server cluster, with each server providing the same or similar services. A load balancing application is managed at the front end o f the server cluster to distribute user requests in the server cluster according to pre-configured load balancing rules, provide services, and maintain the servers. Load balancing bring good advantage such as bring faster application, low cost, the available resources will not be wasted, and no high-end devices are needed for the new resources. It is expandability. When services are increasing, the system can satisfy the needs by adding servers, without affecting the existing services and reducing service quality. Load balancing also has high reliability. When a server fails, the LB application or LB device redistributes user requests to other servers in the same cluster, ensuring uninterrupted services.
ANALISIS PERBANDINGAN METODE WEIGHTED PRODUCT (WP) DENGAN METODE SIMPLE ADDITIVE WEIGHTING (SAW) UNTUK PENDUKUNG KEPUTUSAN PEMILIHAN BIRO PERJALANAN PARIWISATA Pradito, Ryzal; Indrianingsih, Yuliani
Compiler Vol 3, No 2 (2014): November
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (148.013 KB)

Abstract

Decision Support System (DSS) is a system that helps managers to solve a semi-structured problem. There are techniques used to make the DSS, one of them is Fuzzy Logic Multi Criteria Decission Makaing (MCDM). Weigthed Product Method (WP) and Single Additive Weighting Method (SAW) is a method to solve the problem using multiplication to connect the atribute ratings, where rating attributes must be raised first with the weight relevant attributes weights. The applications results show comparison WP methods and SAW methods is closer to the value 1, so that the SAW method is the most appropriate method to solve the problem of the selection a trvel agency tourism.
SISTEM PENDUKUNG KEPUTUSAN PENENTUAN JENIS TANAMAN PANGAN BERDASARKAN KANDUNGAN TANAH MENGGUNAKAN METODE ANALYTICAL HIERARCHY PROCESS (AHP) DENGAN ALGORITMA GENETIKA Indrianingsih, Yuliani; Naibaho, Winda Susyanti
Compiler Vol 4, No 2 (2015): November
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (217.003 KB)

Abstract

Samosir regency is a from North Sumatera province which dominantly people is live on agriculture. The most of the farmers using autodidact learning to determining the types of plants that will be process the appropriate with their land, where farmers just learn from their experiences and exchange opinion with another farmers. Based of the problem, the system will be built by Analytical Hierarchy Process (AHP) with Genetic Algorithm. The result of the testing from method Analytical Hierarchy Process (AHP) obtained result with consistency ratio values < 0,1, which is -0,5936 while the result of the testing from Genetic Algorithm obtained value of the fitness is 157,25. Based on the test results, it can be concluded that the method Analytical Hierarchy Process (AHP) obtained the result more consistent with the value of consistency ratio should be < 0,1, so it will be easier to making decision, while on the analysis of Genetic Algorithm, obtained result are probabilistic as always having random process, so that decision making can not be consistent. So, Decision Support System to determination of plants based by contents of soil which are good and suitable is method Analytical Hierarchy Process (AHP).
PENERAPAN EIGENFACE UNTUK COMPUTER BASED TEST (CBT) PENERIMAAN MAHASISWA BARU SEKOLAH TINGGI TEKNOLOGI ADISUTJIPTO Sajati, Haruno; Ayuningtyas, Astika; Kholistyanto, Dwi
Compiler Vol 6, No 2 (2017): November
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (447.556 KB)

Abstract

One of the development of computer technology is the availability of systems or applications that help human work everyday so that can be resolved quickly and correctly. The system, one of which is Computer Based Test (CBT). CBT is an application used for tests conducted using computers that are in the application there are some features of CBT security when working on the problem. CBT can use a stand-alone computer, a computer connected to a network or a computer connected to the internet. Facial recognition is a type of biometric application that can identify specific individuals in a digital image by analyzing and developing face patterns. In its implementation, CBT has a weakness in the security system that becomes the gap of CBT users to commit fraud, therefore required a good security system with the creation of CBT applications that use eigenface algorithm. It is necessary to have a security system that overcomes the problem that is required identification of face recognition of participants during the test so that cheating can be reduced. The results of the test using eigenface algorithm accuracy rate reached 82%, some things that affect the level of accuracy is, the intensity of light, facial position and the use of accessories on the face.
PENERAPAN ALGORITMA SAPA PADA JARINGAN AD-HOC UNTUK MENGIDENTIFIKASI KOMPUTER BERBASIS MAC ADDRESS Widyarto, Chris Tri; Wintolo, Hero; Indrianingsih, Yuliani
Compiler Vol 2, No 1 (2013): Mei
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (739.772 KB)

Abstract

Wi-Fi waves are commonly used as an intermediary in the communication relationships in the wireless network. However, the use o f Wi-Fi waves can be used in addition to getting the relationship in the network, the user is also able to detect and identify other devices by using Wi-Fi waves. Ad-hoc network is a network that can be built independently by the computer with the Microsoft Windows operating system, to enable ad-hoc device has to have an identity that is SSID, the SSID is then activate the device can be detected by other devices. Activation is done ad-hoc by the netsh command is a shell command in the Windows 7 operating system. An ID must be unique for each device as there is no dual identity, to maximize the identification process. Utilizing MAC address as an identity is used, allowing the device to be uniquely identified. In addition to the MAC address is added to the device profile in the identity o f the device for easier identification. Sapa application users can identify the device is detected, and recognize it as a co-owned devices. Scheme which is the concept o f the algorithm Sapa. Sapa application allows device activation or notebook PC with the Windows 7 operating system to be detected and detected by other devices with the Windows 7 operating system and applications are also active Sapa. Communication is established indirect communication that occurs in a single direction. Detection range can be done up to 77 meters distance.
SISTEM PAKAR UJI KOMPETENSI BAGI SISWA BERKEBUTUHAN KHUSUS AUTIS DENGAN MENGGUNAKAN METODE SINGLE LINKAGE Suryanto, Baginda; Honggowibowo, Anton Setiawan; Indrianingsih, Yuliani
Compiler Vol 3, No 1 (2014): Mei
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (238.754 KB)

Abstract

Conventional knowledge test on the learning outcomes that have been given by previous teachers, often making bored students with autism. The results obtained are less accurate and require teachers to perform even the repetition of material grading explanations often not objective. Provision of additional material not often right on target, and even students who need to get a repetition of material often do not get the repetition of material. Expert Systems Competency Test Program for Students with Special Needs Autism is designed with the needs of the school that is the subject of research and data collection. Cluster analysis works by grouping students by similarity score minimum euclidian distance of each data. This program tests every student and provide an explanation for the repetition of questions whose answers are not in accordance with the specified result.Program based on the use of Expert Systems Competency Test for Students with Special Needs Autism, the results obtained grouping students based on their level of intelligence that has been stored in the process of testing the competency test conducted by the students with autism. So that teachers can provide in the future teaching methods to suit the needs of students in order to enhance the level of intelligence of autistic students.
MEMBANGUN SISTEM KEAMANAN ARP SPOOFING MEMANFAATKAN ARPWATCH DAN ADDONS FIREFOX Zonggonau, Kristopedus; Sajati, Haruno
Compiler Vol 4, No 1 (2015): Mei
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (199.955 KB)

Abstract

The Development of information Technology, especially computer networks and the service in a rejuvenate the human side. The development of the internet is very widespread. The security level digital data becomes vulnerable to attack by the attacker. Arp spoofing is one of the attacks in a network that can be used to view digital data traffic such as emails, passwords and etc, when is running in the network. The process of prevention againtst arp spoofing attacks, made an application to detect and block the attacker in the network by Firefox Addons. Attacker will be directly blocking (drop) into to Mikrotik OS. Users avoid the attack arp spoofing. The results of testing one, two and three can be detect and block the presentation of the results of 83%, so That’s the terms of security in the network can be safe from attack to the attacker.
PERANCANGAN MAIL CLIENT MENGGUNAKAN MEKANISME CREATE FOLDER OTOMATIS Kusumaningrum, Anggraini; Ayuningtyas, Astika; Sipayung, Lely Delvia
Compiler Vol 6, No 1 (2017): Mei
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (900.641 KB)

Abstract

The development of computer technology and telecommunications right now has changed the way society communicates. The technology used to communicate exists since the first Internet presence, that is to say by using the electronic mail. Email is a technology that allows everyone to communicate by sending messages or files. As with other ways that can be used to read and send emails, use the email client application. Email client is an application installed on a computer device used to access the email account on an email server, the email client does not need to use a browser application. But as long as this classification on email is still done manually on the part where the file storage download. To resolve the issue ranking of emails can be done automatically according to the name of the subject of e-mail, messages or files that are entered on the e-mail client of the application can then be downloaded and the data to download are stored in the folder that corresponds to the name of the subject e-mail, so that a message or file will be stored in a folder, it gives the convenience classification for mail client application mail user electronic with the number of messages or files that are much more consistent with the existing keywords in the subject of the email. This email client application can create folders automatically when downloading messages. Then, the downloaded file will be stored in the folder corresponding to the name of the subject. The file extension downloaded * .ml, the file can be opened via the mail client application. The mail client application can run on Windows and Linux operating systems.
WEB SERVICE FOR SUPPORTING OF WEBSITE PERFORMANCE Pamungkas, Sinta Tri; Basukesti, Agus; Nugraheny, Dwi
Compiler Vol 1, No 2 (2012): November
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (179.766 KB)

Abstract

The growth of the web services  make people tend to think far ahead to discover new things on this technology. Increasing development and evolution of the various developments. Web service is one of media that suitable for system and platform communication, this service is considered as an efficient and effective  communication facility. Web service make a system communication  connected with Internet.The system is built with a proper analysis and  effective design to help human to communicate each other. The  design from start to end, is useful to help in writing the command of blogs which has a lot of comments. The  comments that belong to many website/blogs is recorder into one report so that make the review become easier. It also can  maximize the quality and the quantity of the website / blog.System is designed to facilitate the manager of the website/blog, especially in the pe-an-record comments entered. Manager of the website / blog just need to  provide a form which connected to the database as a means of data entry comments.

Page 9 of 43 | Total Record : 423