cover
Filter by Year
Compiler
Jurnal "COMPILER" dengan ISSN Cetak : 2252-3839 dan ISSN On Line 2549-2403 adalah jurnal yang diterbitkan oleh Departement Informatika Sekolah Tinggi Teknologi Adisutjipto Yogyakarta. Jurnal ini memuat artikel yang merupakan hasil-hasil penelitian dengan bidang kajian Struktur Diskrit, Ilmu Komputasi , Algoritma dan Kompleksitas, Bahasa Pemrograman, Sistem Cerdas, Rekayasa Perangkat Lunak, Manajemen Informasi, Dasar-dasar Pengembangan Perangkat Lunak, Interaksi Manusia-Komputer, Pengembangan Berbasis Platform, Arsitektur dan Organisasi Komputer, Sistem Operasi, Dasar-dasar Sistem,Penjaminan dan Keamanan Informasi, Grafis dan Visualisasi, Komputasi Paralel dan Terdistribusi, Jaringan dan Komunikasi, Desain, Animasi dan Simulasi Pesawat Terbang. Compiler terbit setiap bulan Mei dan November.
Articles by issue : Vol 2, No 2 (2013): November
17
Articles
PERANCANGAN KEAMANAN SISTEM MENGGUNAKAN ALGORITMA HONEYPOT PADA APLIKASI KRS ONLINE (STUDI KASUS : SEKOLAH TINGGI TEKNOLOGI ADISUTJIPTO)

Setiawan, Yoris, Sajati, Haruno, Sudibya, Bambang

Compiler Vol 2, No 2 (2013): November
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Original Source | Check in Google Scholar | Full PDF (160.53 KB)

Abstract

Many colleges already apply web based academic information system use internet connection, so it is need a system security to protect from attacks such as SQL Injection and Brute Force. Honeypot is a system security which devide two system that are original and fake system. Original system used by user to access academic information system that source from correct database. While fake system used to separate hacker and user. Hackers who try to enter with SQL Injection is send to fake system directly which has wrong data. This fake system seems correct and all action that was happened in will be noted on log history. When hacker try some password ese Brute Force, system will reset user password automatically. This system already test with 79 times SQL Injection and 29 times Brute Force attack. All attacks can handle nicely with honeypot algorithm.

PERANCANGAN ALGORITMA ANGGI (AA) DENGAN MEMANFAATKAN DIFFIE-HELLMAN DAN RONALD RIVEST (RC4) UNTUK MEMBANGUN SISTEM KEAMANAN BERBASIS PORT KNOCKING

Suhendar, Anggi Sri Septiani, Sajati, Haruno, Astuti, Yenni

Compiler Vol 2, No 2 (2013): November
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Original Source | Check in Google Scholar | Full PDF (154.818 KB)

Abstract

In managing a server, an administrator takes a variety of ways for ensuring the safety and cosiness of the system. One type of threat that attack on the server is done on a port that is in an open state, thus making people who do not have access rights to perform port scanning to infiltrate into the server. One solution to cope with the attack on the port can be done by using port knocking. Port knocking is a method that can be applied to the server with the workings of such a code to unlock the safe. Port knocking is done by inserting a predetermined port sequenced to open a specific port. At the port sequenced delivery process takes an additional authentication likes keyport. Anggi algorithm (AA) is an algorithm that is built by combination o f Diffie-Hellman and RC4. The algorithm is used for encryption and descriptions a keyport from client side to the server side. In the process of sending a keyport to be modified by using the arithmetic calculation. Process of encryption and description keyport is done to prevent some attacks on the server by hackers with extracting such information after successfully breaking into a port. The results o f implementation AA algorithm on the process of port knocking can secure the delivery process o f keyport and improve the security o f server.

PERENCANAAN DAN PENGENDALIAN KAPASITAS WAKTU PRODUKSI DENGAN METODE ROUGH CUT CAPACITY PLANNING PADA SISTEM INFORMASI DI PERCETAKAN MAXIMEM

Muntaqi, Rifdan, Honggowibowo, Anton Setiawan, Nugraheny, Dwi

Compiler Vol 2, No 2 (2013): November
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Original Source | Check in Google Scholar | Full PDF (149.451 KB)

Abstract

The increasing consumer demand for printing services that utilize existing capacity resulting in an imbalance in the production floor. When orders come in, the company has always approved the transaction without first reviewing the available resources. Time capacity planning and control is one very important element in decision-making. On research planning and control of production capacity using the data available capacity in each period and the capacity required to fulfill orders in the period.Capacity Planning and Control Production Time Rough Cut Capacity Planning Methods to determine the estimated processing time, capacity reports, and decisions o f the order. The test results o f the 30 respondents apilkasi display application users are 67%, 70% users ease, clarity of information and data is 80%, 57% apilkasi usefulness, 80% rated the overall application. Thus, the Capacity Planning and Control Of Time With Rough Cut Capacity Planning Method Information System At Maximem Printing use this app either.

PERANCANGAN DAN PENERAPAN ALGORITMA NAKULA SADEWA UNTUK MENGATASI DUPLIKASI PEMILIHAN DI TEMPAT PEMUNGUTAN SUARA

Prayogi, Yogi Priyo, Wintolo, Hero, Indrianingsih, Yuliani

Compiler Vol 2, No 2 (2013): November
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Original Source | Check in Google Scholar | Full PDF (246.828 KB)

Abstract

The security o f election's data in a manual election process is susceptible to some fraud activity, one of them is voter's identity theft activity which will be used to vote more than one time. The regulation which allow the voter to vote on another town has  became a hole that can be used the perpetrator to vote using stolen identity as no one knows him and his true identity. This fraud activity will have direct impact to the result o f election. This fraud can be contained by using Nakula Sadewa Algorithm which will analyze and compare the voter's home voting place to the voting place that the voter's use to do the voting activity. The voter's can still vote on another town, but heavily encouraged to vote on his hometown.

PENGARUH JARAK TERHADAP KUALITAS GAMBAR DALAM PENGIRIMAN CITRA DIGITAL MELALUI JARINGAN WIRELESS PADA KAMERA LS Y201

Hidayat, Zhulfa Arif, Dermawan, Denny, Retnowati, Nurcahyani Dewi

Compiler Vol 2, No 2 (2013): November
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Original Source | Check in Google Scholar | Full PDF (134.092 KB)

Abstract

Digital image was needed us a medium of information that can be transmitted by cable or wireless media. To obtain digital images must use a tool such as a camera. Users can use the camera to get a digital image with the remote sensing method on an object in a particular place. In the daily activities, users can take advantages of the digital image (pictures or video) that are useful for media documentation, monitoring system in somewhere and others. The design of this tool using LS_Y201camera to capture a digital image and wireless as a data transmission media. In this case a wireless media use Ultra High Frequency transmitter and receiver that support for remote sensing. Users run the tool through an application that is connected with a wireless media. This application is designed byDelphi7. Applications and wireless camera was made for simulation media of remote sensing and monitoring system in the blank spot area. The test result of applications and tools that use the Ultra High Frequency (wireless), can be viewed from a computer interface. In this case, the signal strength ofthe transmitter greatly affect the maximum distance that can be taken to make capture process. The test results are as follows: the best results at a distance of 10 meters = 011110102 (12210); distance of 20 meters = 011100112 (11510); distance of 30 meters = 011110102 (12210); distance of 40 meters =011011112 (11110); distance of 50 meters = 011100102 (11410). So the best distance to digital images transmission through a wireless networks are at a distance of 40 meters.

PENERAPAN ALGORITMA ARI BORNEO (AB) UNTUK PEMBACAAN TEKS DENGAN MEMANFAATKAN MICROSOFT SPEECH DAN ID1

Restani, Ari, Honggowibowo, Anton Setiawan, Indrianingsih, Yuliani

Compiler Vol 2, No 2 (2013): November
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Original Source | Check in Google Scholar | Full PDF (202.093 KB)

Abstract

Reading is an activity person to obtain information from something written. Reading involves recognition of the symbol and the letters that make a language. But there are some people who are lazy to read text in English language which is not a language that is used everyday by Indonesian people. In addition to reading, there are also the most common activities to obtain information that is heard. Hear is a way to gain an understanding of the meaning of the information in the form or sound using auditory senses. Reading activities contributed 10% ability for know information, with listening, knowing information can reach 30%. With conditions like this, then it needs an alternative media that can help treat the condition. The alternative media that can be made is text to speech fo r read text in Indonesia language and English language, for detection language using Ari Borneo Algorithm. These systems are made using Delphi 7 programming language, MBROLA Tools as Indonesia-speaking sound generators and Microsoft Speech API as English sound generator. Through this system, userscan absorb information from listening to the reading o f text by both systems.

COMPARATIVE ANALYSIS OF XML AND JSON USING PHP APPLICATION PLATFORM WITH REPRESENTATIONAL STATE TRANSFER ( REST ) ARCHITECTURAL

Saryanto, Saryanto, Sumarsono, Sumarsono, Retnowati, Nurcahyani Dewi

Compiler Vol 2, No 2 (2013): November
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Original Source | Check in Google Scholar | Full PDF (186.759 KB)

Abstract

Data communication in the internet today is so complex as an example of the speed factor becomes very important in communicating, everyone wants fast data communication services provided in order to maximum. In relation to the application as a communication liaison with client server applications, web service using a data serialization format to transmit the data. Before the data is sent, either fromthe client to the server or vice versa, should be modified in a specific data format beforehand according to the web service is used. Types of data serialization format used in the web service such as XML and JSON. The method used for testing include data serialization method, data measurement method and data parsing method. Data serialization method is used to calculate the time serialization of data from the database to the form of XML and JSON in applications with PHP platform. Data measurement method used to measure the size of the XML and JSON data which based on many fields of data serialization process. Data parsing method is used to calculate the processing time and JSON parsing XML data. Results o f comparative analysis o f XML and JSON in PHP applications using thearchitecture Rest can be concluded that the test result o f the difference in time and time serialization and JSON parsing XML data is influenced by the number o f records, if the number of records the greater the difference in eating time data serialization and parsing the data the greater the time also itcan be concluded that the faster the process JSON serialization and parsing XML data is compared. Testing results o f the JSON data size is smaller than the size of XML. Data exchange using XML format has a size limit of up to 31456.31 KB while JSON XML exceeds the size limit. Testing results on the Internet when the number o f records up to 50,000 data when the data serialization and parsing time data can not be detected in the database.

SISTEM LAYANAN ANTAR PADA RESTORAN BERBASIS ANDROID

Bagus Pratama, Endyatna Puthut, Sumarsono, Sumarsono, Tamatjita, Elizabeth Nurmiyati

Compiler Vol 2, No 2 (2013): November
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Original Source | Check in Google Scholar | Full PDF (310.581 KB)

Abstract

The business restaurant is growing. In this fast business is need application mobile for customer satisfaction. This system his many applications. They are customer, manager, web kitchen and deliveryapplication. This application is using android Operating System. Using that application by maps for knowing the places o f customer. The results are 100% fo r delivery service, 93% to level o f effective and efficient, 97% to time service system and 97% o f delivery order system.

PENERAPAN SISTEM TERDISTRIBUSI PADA TOGETHER IN A SINGLE CONNECTION (TSC) BERBASIS WEB

Zuliana, Zuliana, Wintolo, Hero, Sudibya, Bambang

Compiler Vol 2, No 2 (2013): November
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Original Source | Check in Google Scholar | Full PDF (142.647 KB)

Abstract

Distributed system is a computer networking technology which can be hardware or software. In hardware distributed system by a collection of computers that are heterogeneous, being in the software system is distributed in the form of software that connects two applications in the form of client and server side. TSC method is a method that already existed before, which can be used increase the ranking o f a blog. Implementation distributed system for TSC using landing page as the intermediary. Landing page serves as a liaison between web applications or blogs are listed as a member to raise the ranking of a database on the application server side. When someone does click on landing page seoindonesia, will open a blog or other web members. Landing page so it can be used as a way to count the number of visitors to a blog or website, which in turn can increase the number o f page visits and 1 with 1 clickbutton seoindonesia for test in histats.com.

PEMANFAATAN INTRUSION DETECTION SYSTEM (IDS) SEBAGAI OTOMATISASI KONFIGURASI FIREWALL BERBASIS WEB SERVICE MENGGUNAKAN ARSITEKTUR REPRESENTATIONAL STATE TRANSFER (REST)

Awangga, Demmy Nanda, Sajati, Haruno, Astuti, Yenni

Compiler Vol 2, No 2 (2013): November
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Original Source | Check in Google Scholar | Full PDF (300.762 KB)

Abstract

Many things can destabilize a computer network connections, both with regard to hardware and software. Therefore, we need a technique for network security, one of them is firewall. The problems that arise in this final project is to build a linux based firewall automation application via web service by using REST (Representational State Transfer) architecture and IDS (Intrusion Detection System). The system buid firewall rules using linux operating system with the help o f 2 pieces o f IDS to detect theactivities of traffic data between the intruder and the server that will be recorded in the IDS database. The system will compare the server with IDS on the router to get the IP address o f the actual intruders, so it will be blocked by the firewall. The applications is used to prevents the ping o f death attack usingweb service and REST protocol so that firewall rules will run automatically.