cover
Filter by Year
Compiler
Jurnal "COMPILER" dengan ISSN Cetak : 2252-3839 dan ISSN On Line 2549-2403 adalah jurnal yang diterbitkan oleh Departement Informatika Sekolah Tinggi Teknologi Adisutjipto Yogyakarta. Jurnal ini memuat artikel yang merupakan hasil-hasil penelitian dengan bidang kajian Struktur Diskrit, Ilmu Komputasi , Algoritma dan Kompleksitas, Bahasa Pemrograman, Sistem Cerdas, Rekayasa Perangkat Lunak, Manajemen Informasi, Dasar-dasar Pengembangan Perangkat Lunak, Interaksi Manusia-Komputer, Pengembangan Berbasis Platform, Arsitektur dan Organisasi Komputer, Sistem Operasi, Dasar-dasar Sistem,Penjaminan dan Keamanan Informasi, Grafis dan Visualisasi, Komputasi Paralel dan Terdistribusi, Jaringan dan Komunikasi, Desain, Animasi dan Simulasi Pesawat Terbang. Compiler terbit setiap bulan Mei dan November.
Articles by issue : Vol 3, No 1 (2014): Mei
11
Articles
PENERAPAN SISTEM KEAMANAN MENGGUNAKAN CRYPTOGRAPHY PADA APLIKASI CHATTING DENGAN MEMODIFIKASI ALGORITMA RIVEST SHAMIR ADLEMAN (RSA)

Muttaqin, Muttaqin, Sajati, Haruno, Retnowati, Nurcahyani Dewi

Compiler Vol 3, No 1 (2014): Mei
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Original Source | Check in Google Scholar | Full PDF (288.434 KB)

Abstract

Chatting application is an application which used for communication through local network or internet. It can use to make communication to be effective and easy to use but there are several shortage in delivery information process is data security when communication is going on. Using chrypthography with modification Rivest Shamir adleman (RSA) algorithm in encryption process and decryption on packet data which transmited is one of security system which can used in this application then the security of data packet secured. Result from implementation of chatting application which apply chrypthography with modification Rivest Shamir adleman (RSA) algorithm have done in local network and internet able to run smoothly and have done by several testing cases based on certain scenario.  Whereas process testing encryption  and decryption using tools wireshark.

BANDWIDTH MANAGEMENT TO SET OF INTERNET CONNECTION REFERING FROM STRUCTURAL POSITION USE MIKROTIK RB751-2HnD WITH WEB BASED IN ADISUTJIPTO HIGH SCHOOL TECHNOLOGY

Sulistiyo, Brama Ady, Sajati, Haruno, Tamatjita, Elizabeth Nurmiyati

Compiler Vol 3, No 1 (2014): Mei
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Original Source | Check in Google Scholar | Full PDF (110.924 KB)

Abstract

Development of information technology and computer networks in particular its services on the one hand facilitate the work of human beings, but as a very widespread internet usage, internet access usage levels become unmanageable. The need for a web-based application that facilitates an admin to manage the bandwidth seems very necessary. By using or utilizing the API (application programming interface) that has been provided by the router is to create a Bandwidth Management Application To Set Internet Connection Referring Structural Position Use Mikrotik RB751G - 2HnD With Web Based In Adisutjipto Technology High School. The results Application test show and prove that bandwidth isn’t right as the transfer rate. As for transfer rate or download speed is not affected by bandwidth rather influenced by the size distribution of the bandwidth paths. Test results also proved that a bandwidth leased from a provider not in accordance with the offer.

PERANCANGAN APLIKASI CHAT TRANSLATOR BERBASIS DESKTOP UNTUK KOMUNIKASI DUA BAHASA DALAM JARINGAN KOMPUTER

Prasetya, Pradana Nur, Wintolo, Hero, Retnowati, Nurcahyani Dewi

Compiler Vol 3, No 1 (2014): Mei
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Original Source | Check in Google Scholar | Full PDF (171.467 KB)

Abstract

One way of written communication is to send a message to the others. With the current technological developments, written communication can be supported by the computer and internet media so that messages sent can be delivered to target internet users in a short time and geographical distance is no longer a barrier of communication. In communicating between countries is often used in English, but that will be an obstacle when the language used to write the message was not understood by the other person and vice versa. Seeing this condition, then there needs to be an alternative media to overcome these obstacles. One of them is to design a bilingual (Indonesian-English) chat translator application. The system was created using Delphi 7 as a programming language and Oracle as Indonesian and English vocabulary storage database. Through this system, users can send messages using Indonesian or English and receive messages according to language used. The result from the design of this application indicates that the application is able to translate the text that is sent into the appropriate language which is controlled by interlocutors. So it can be a solution to communicate although with different language. However, the ability of the translator is very dependent on the current record in the dictionary table, so the translation can be developed in subsequent research to be more complete and better.

SISTEM KEAMANAN JAIL BASH UNTUK MENGAMANKAN AKUN LEGAL DARI KEJAHATAN INTERNET MENGGUNAKAN THC-HYDRA

Hamka, Cakra Aminuddin, Sajati, Haruno, Indrianingsih, Yuliani

Compiler Vol 3, No 1 (2014): Mei
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Original Source | Check in Google Scholar | Full PDF (211.103 KB)

Abstract

Along with the development of current technology, making technology is very important in today's life. Security level digital data has become more vulnerable to exploitation, the problem arises when an information technology device was attacked by people who do not want to take a responsible and important data illegally, so the administrator must act quickly to secure important data. Making a data security technology on the internet is very important information. Limitations administrator underlying the creation of a system that is able to detect and defense systems against such attacks is automation, so that it can be applied to data security. The system is built to prevent attacks on computer networks with more specific on THC - Hydra. This system will analyze the number of errors in the log into the database, and if the error exceeds the tolerance rules are made by the administrator. If the error is more than 3 times in one minute, then with automation, the system will create a rule that can imprison users who do not have such access, and access to the prison in the illegal user can not perform such activities on legal access and access to activities conducted illegal user can be recorded on a file and jail.txt. So under any circumstances and not in supervising administrator, the security of other user data will be safe and can not be retrieved or viewed by a user of illegal access.

PERANCANGAN DAN PENERAPAN ALGORITMA RIZKI TANJUNG 24 (RTG24) UNTUK KOMPARASI KATA PADA FILE TEXT

Tanjung, Rizki, Sajati, Haruno, Nugraheny, Dwi

Compiler Vol 3, No 1 (2014): Mei
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Original Source | Check in Google Scholar | Full PDF (118.663 KB)

Abstract

Plagiarism is the act of taking essay or work of others, and recognize it as his own work. Plagiarism of the text is very common and difficult to avoid. Therefore, many created a system that can assist in plagiarism detection text document. To make the detection of plagiarism of text documents at its core is to perform string matching. This makes the emergence of the idea to build an algorithm that will be implemented in RTG24 Comparison file.txt applications. Document to be compared must be a file. Txt or plaintext, and every word contained in the document must be in the dictionary of Indonesian. RTG24 algorithm works by determining the number of same or similar words in any text between the two documents. In the process RTG24 algorithm has several stages: parsing, filtering, stemming and comparison. Parsing stage is the stage where every sentence in the document will be broken down into basic words, filtering step is cleaning the particles are not important. The next stage, stemming is the stage where every word searchable basic word or root word, this is done to simplify and facilitate comparison between the two documents. Right after through the process of parsing, filtering, and stemming, then the document should be inserted into the array for the comparison or the comparison between the two documents. So it can be determined the percentage of similarity between the two documents.

SISTEM PAKAR UJI KOMPETENSI BAGI SISWA BERKEBUTUHAN KHUSUS AUTIS DENGAN MENGGUNAKAN METODE SINGLE LINKAGE

Suryanto, Baginda, Honggowibowo, Anton Setiawan, Indrianingsih, Yuliani

Compiler Vol 3, No 1 (2014): Mei
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Original Source | Check in Google Scholar | Full PDF (238.754 KB)

Abstract

Conventional knowledge test on the learning outcomes that have been given by previous teachers, often making bored students with autism. The results obtained are less accurate and require teachers to perform even the repetition of material grading explanations often not objective. Provision of additional material not often right on target, and even students who need to get a repetition of material often do not get the repetition of material. Expert Systems Competency Test Program for Students with Special Needs Autism is designed with the needs of the school that is the subject of research and data collection. Cluster analysis works by grouping students by similarity score minimum euclidian distance of each data. This program tests every student and provide an explanation for the repetition of questions whose answers are not in accordance with the specified result.Program based on the use of Expert Systems Competency Test for Students with Special Needs Autism, the results obtained grouping students based on their level of intelligence that has been stored in the process of testing the competency test conducted by the students with autism. So that teachers can provide in the future teaching methods to suit the needs of students in order to enhance the level of intelligence of autistic students.

SIMULATOR KENDALI PESAWAT TERBANG EXTRA 300 L BERBASIS3D DENGAN METODE SIMULATION GAME

Aryanto, Salam, Retnowati, Nurcahyani Dewi, Basir, Basir

Compiler Vol 3, No 1 (2014): Mei
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Original Source | Check in Google Scholar | Full PDF (184.553 KB)

Abstract

One of the methods to improve the understanding of the learner is to use an interactive simulator aircraft by utilizing information and communication technology so as to explain the flight control system and its functions better. Making this simulator using Adobe Photoshop, 3D Studio Max, and 3DRad. The software used to create the interface design, 3D design, as well as as simulator engine. Simulator Extra 300 L aircraft provide convenience to the user to know and understand the control plane fly Extra 300 L.The use of this simulator is more interactive in the delivery of information to the user than an explanation using propsor in video form. This simulator is designed user friendly as well as trials conducted by 30 respondents, the majority of respondents stated that this simulator is good and fit for use as a medium of learning control of an aircraft.

ANALISIS DAN RANCANGAN PROTOTIPE MANAJEMEN DOKUMENTASI REKAYASA PERANGKAT LUNAK

Putro, Hanson Prihantoro

Compiler Vol 3, No 1 (2014): Mei
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Original Source | Check in Google Scholar | Full PDF (227.406 KB)

Abstract

In our department, lectures found that students are difficult to create documentation, especially software documentation. Besides, software documentation is an important handbook in a software engineering. We need tools to help students or people that learn software engineering to create software documentation. This paper explains how to analyze and design a prototype for software documentation management. We propose three steps to do: problem analysis, prototype development and evaluation. First, we do the problem analysis by defining the component inputs, documentation management models and printing process. Then, the prototype is developed with object oriented software analysis and design. Finally, we create a traceability table and conduct a design testing in the evaluation step. At the result, we build analysis and design for a prototype to manage software engineering documentation with six use cases. The evaluation is conducted which well modeling the functional requirements. 26 errors are found and already refined in the documentation report. We ensure that this design is ready to implement.

ANALISA METODE MEDIAN PADA PENENTUAN TITIK TENGAH DI GOOGLE MAPS

Novianto, Kurnia Rizki, Sumarsono, Sumarsono, Indrianingsih, Yuliani

Compiler Vol 3, No 1 (2014): Mei
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Original Source | Check in Google Scholar | Full PDF (230.353 KB)

Abstract

Information technology to used facilitate the lives of humans in performing activities have come to the stage of the hand grip. The intent of this grip is a form of computer that is small and can be hand held adult human hand, for example in the form of smartphones, laptops, and tablets. This equipment can help people to access the internet that provide maps and location services on earth . With the internet user will easily dig resources with ease. Thus with the internet it is essential for human life until the source of the future. Problems that arise in the world of internet or computer network often arise and prevent the problem. Limitations of resources based on google maps is very necessary for a person to get the intended location. This system will help a person in getting the distance of the intersection to a point latitude and longitude coordinates by calculating the midpoint of the user, and then calculate the distance between the midpoint of the location suggested by the system so that the user gets close location to conduct meetings. To specify the system location data using Google Place API to obtain complete data locations along the coordinates of latitude and longitude of a location .

ANALISA PERBANDINGAN WAKTU DAN KECEPATAN TRANSFER PADA MULTI PROTOCOL LABEL SWITCHING (MPLS) DENGAN VIRTUAL PRIVATE NETWORK (VPN) UNTUK PERPINDAHAN DOKUMEN PADA JARINGAN KOMPUTER

Saleh, Ibrahim, Wintolo, Hero, Nugraheny, Dwi

Compiler Vol 3, No 1 (2014): Mei
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Original Source | Check in Google Scholar | Full PDF (189.009 KB)

Abstract

MPLS (Multi Protocol Label Switching) technology has been developed and mostly used by the service provider on their main network. Data packets which forwarded from one router to another router can also use VPN (Virtual Private Network) technology. VPNs were developed in the field of computer networks now have many variants, such as MPLS VPN and VPN which connects between computers or a LAN through a public network is the internet. The purpose of this final task is build a lab scale VPN network with MPLS technology use Mikrotik router RB 750GL and create a VPN connection to the STTA campus network passing the public internet. Then do a comparative analysis of the time required and the speed of transfer on both the network. The results of a comparative analysis between MPLS and VPN with the same file capacity, it appears that the MPLS network is faster in time speed and transfer speed