cover
Contact Name
Hero Wintolo
Contact Email
herowintolo@stta.ac.id
Phone
-
Journal Mail Official
informatika@stta.ac.id
Editorial Address
-
Location
Kab. bantul,
Daerah istimewa yogyakarta
INDONESIA
Compiler
ISSN : 22523839     EISSN : 25492403     DOI : -
Core Subject : Science,
Jurnal "COMPILER" dengan ISSN Cetak : 2252-3839 dan ISSN On Line 2549-2403 adalah jurnal yang diterbitkan oleh Departement Informatika Sekolah Tinggi Teknologi Adisutjipto Yogyakarta. Jurnal ini memuat artikel yang merupakan hasil-hasil penelitian dengan bidang kajian Struktur Diskrit, Ilmu Komputasi , Algoritma dan Kompleksitas, Bahasa Pemrograman, Sistem Cerdas, Rekayasa Perangkat Lunak, Manajemen Informasi, Dasar-dasar Pengembangan Perangkat Lunak, Interaksi Manusia-Komputer, Pengembangan Berbasis Platform, Arsitektur dan Organisasi Komputer, Sistem Operasi, Dasar-dasar Sistem,Penjaminan dan Keamanan Informasi, Grafis dan Visualisasi, Komputasi Paralel dan Terdistribusi, Jaringan dan Komunikasi, Desain, Animasi dan Simulasi Pesawat Terbang. Compiler terbit setiap bulan Mei dan November.
Arjuna Subject : -
Articles 169 Documents
PENGENALAN WARNA BERBASIS ANDROID MENGGUNAKAN METODE TEMPLATE MATCHING Kurniawan, Indra Hading; Retnowati, Nurcahyani Dewi
Compiler Vol 7, No 1 (2018): Mei
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (542.095 KB) | DOI: 10.28989/compiler.v7i1.278

Abstract

Template matching method is a simple and widely used method to recognize patterns. The weakness of this algorithm is the limited model that will be used as a template as a comparison in the database such as shape, size, and orientation. The Extraction Feature algorithm addresses the problem of template models such as the shape, size, and orientation that exist in the matching template algorithm by mapping the characteristics of the image object to be recognized. Optical character recognition is used to translate characters into digital images into text formats. Its simple implementation makes the template matching method widely used. In this final project discusses the introduction of color in an image to be detected color, this color recognition is not fully successful because of the influence of lightness. The workings of this application take picture is by taking a picture and then the application identifies the color of any existing and will issue results in the form of text percent, with a success rate of 15% and 85% failure when detecting a color.
ALGORITMA MASIH MUSLIATUN (MM) UNTUK MENDUKUNG SISTEM OTOMATISASI PENDAFTARAN PRAKTIKUM DENGAN PENGUJIAN PADA JARINGAN KOMPUTER (STUDI KASUS DI STTA YOGYAKARTA) Musliatun, Masih; Sajati, Haruno; Indrianingsih, Yuliani
Compiler Vol 2, No 1 (2013): Mei
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (214.016 KB)

Abstract

Practicum registration systems that exist on campus STTA previously done manually, where students will sign up to the admin to bring proof of payment practicum. Students are free to choose his own class, this often resulted in unbalanced number of students in the classroom lab that is consideredless  effective way. This makes the emergence of the idea to establish an MM algorithm is applied to a practical application o f automation systems. MM algorithm works by determining many lab classes based on students who took the KRS. Furthermore, students who have paid practicum will be immediately incorporated into the classes that are available with regard to the number of students and GPA o f students per class, so it will obtain practical classes by the number o f students and the average GPA o f each class balanced.Concept application using client-server database, where the database is on the Local Area Network (LAN) STTA. To facilitate the management admin, then the application will be tested on the LAN network and VPN (Virtual Private Network) network. LAN is a computers network that are connected to a computer server by using specific topologies, typically used in areas of the building or area a distance o f not more than 1 km (local area). While VPN is a secure way to access the Local Area Network that is in range, using the Internet or other public network to perform packet data transmission in private. By using a VPN, users can access the computer that is on the LAN even though the user is not in the same location with a LAN.
MANAGEMENT SERVER BERBASIS SMS GATEWAY STUDI KASUS PADA GCM EDNOVATION YOGYAKARTA Hidayatullah, Arif; Wintolo, Hero
Compiler Vol 3, No 2 (2014): November
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (128.431 KB)

Abstract

Trust is a key factor in online communication, a hosting that can be accessed quickly and almost never had an error would indicate that the hosting has managed seriously in serving consumers. Therefore a hosting requires regular maintenance and handling of error as soon as possible before consumers feel the effects. On the other side hosting providers need to protect their systems to provide access to others who don’t have the right and protect it using a firewall. Those two things became very difficult to do simultaneously considering the speed and ease of access contrary to the security of the hosting. There are many ways in which the administrators to handling this case.One of many ways is create a private network that can only be accessed from within the network, during time for treatments this private hosting use SMS as  medium, this media have been chosen because it can directly installed within the private network.By using this sms media, administrator can make application that can do the repair server directly without being worried with the danger of the public internet network, because application running on a private network. Applications can also be built more complex so that application will help administrator to monitor condition of the server and repair errors on the server, administrators can do it anywhere without being dependent on a stable internet connection.
SISTEM PENDUKUNG KEPUTUSAN PENENTUAN INVESTASI KELAPA SAWIT DENGAN METODE INTERNAL RATE OF RETURN DALAM SATU BLOCK SAWIT DI LINGGA KUAMANG BUNGO JAMBI Sudibyo, Bambang; Suismianto, Joko
Compiler Vol 4, No 2 (2015): November
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (151.833 KB)

Abstract

ABSTRACTTechnology developed in order to facilitate human work that would not be done manually, with the presence of the latest technologies that it is not a work of man may not be done quickly, accurately, and save time. One was for the manufacture of palm data processing applications that provide an overview to the public that it is feasible to plant palm oil or not to do, based on existing data and then recycled into Decision Support Systems. To process these data using the Internal Rate Of Return (IRR) as a method to make decisions based on data that have been processed. In this study processed data is the data of a group of Palm Jl. Salak Linga Kuamang Bungo Jambi. From the results of the data managed by the farmer group Palm block 22, Jalan Salak, Linga Kuamang, with interpolation of 30% per year, with a capital of USD 888,253,000.00 and generate income of Rp 2,063,387,050.00 in if using the Internal rate of Return produce interpolation (I) of 30, 113%. Since IRR> I, then it is worth to continue.
SISTEM PAKAR PADA TANAMAN APOTEK HIDUP UNTUK PENGOBATAN ALTERNATIF MENGGUNAKAN METODE CERTAINTY FACTOR Satriadi, Dimas; Honggowibowo, Anton Setiawan; Indrianingsih, Yuliani
Compiler Vol 6, No 2 (2017): November
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (551.699 KB)

Abstract

Medical treatment using herbal plants rarely utilized by the society, because most of them didn't know the benefit inside herbal plants. therefore needed an application to educate the society about herbal life. Application system was a product of research by a herbal expert using certainty factor. Certainty factor method was a method that to believe on an event based on expert judment. Besides educating society about the benefit of herbal plants, the expert system could help to provide a consultation. Result of expert system consultation with certainty factor was to minimize uncertainty in medical treatment using herbal plants.
PENERAPAN METODE SOBEL UNTUK PENGUKURAN TINGGI BADAN MENGGUNAKAN WEBCAM Putra, Ade Noversi; Basukesti, Agus; Nugraheny, Dwi
Compiler Vol 2, No 1 (2013): Mei
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (146.204 KB)

Abstract

Measurement o f human height is usually done with the help o f others. But with the Sobel method, measurement o f human height can be done alone. It can simplify the process o f measuring human height. The method is a development method robert sobel using filter HPF (high pass filter) that given a zero buffer. This method takes the principle o f the laplacian and gaussian function is known as a function to generate HPF. Applications designed using sobel method can be used for high meassure an object with a small error rate. Best distance o f 20 cm from the background to the object seen from the results o f the error rate.
BANDWIDTH MANAGEMENT TO SET OF INTERNET CONNECTION REFERING FROM STRUCTURAL POSITION USE MIKROTIK RB751-2HnD WITH WEB BASED IN ADISUTJIPTO HIGH SCHOOL TECHNOLOGY Sulistiyo, Brama Ady; Sajati, Haruno; Tamatjita, Elizabeth Nurmiyati
Compiler Vol 3, No 1 (2014): Mei
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (110.924 KB)

Abstract

Development of information technology and computer networks in particular its services on the one hand facilitate the work of human beings, but as a very widespread internet usage, internet access usage levels become unmanageable. The need for a web-based application that facilitates an admin to manage the bandwidth seems very necessary. By using or utilizing the API (application programming interface) that has been provided by the router is to create a Bandwidth Management Application To Set Internet Connection Referring Structural Position Use Mikrotik RB751G - 2HnD With Web Based In Adisutjipto Technology High School. The results Application test show and prove that bandwidth isn’t right as the transfer rate. As for transfer rate or download speed is not affected by bandwidth rather influenced by the size distribution of the bandwidth paths. Test results also proved that a bandwidth leased from a provider not in accordance with the offer.
MODIFIKASI ALGORITMA VIGENÈRE CIPHER MENGGUNAKAN METODE CATALAN NUMBER DAN DOUBLE COLUMNAR TRANSPOSITION Pratama, Guruh Marindra; Tamatjita, E.Nurmiyati
Compiler Vol 4, No 1 (2015): Mei
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (201.514 KB)

Abstract

Vigenère Cipher is one of the well-known ciphering algorithms of the past. Modifications to Vigenère Cipher algorithm is made to improve its security, making it more difficult to decipher by a cryptanalyst. Due to the nature of the algorithm, these measures have to be taken to maintain the confidentiality of ciphered data.  This research modified the Vigenère Cipher using Catalan Numbers method and Double Columnar Transposition.  Catalan Numbers method is a mathematical method used to randomize the initial key so as to generate a key which is longer and having stronger characteristics; a key which is harder to guess, either by cryptanalysts or by key-deciphering methods. In addition to the first method, Double Columnar Transposition is used to rearrange the position of data in the generated ciphertext in order to make it appear more random, hence slowing down the cryptanalysis process of the encrypted text. Double Columnar Transposition is done by applying columnar transposition twice to the ciphered text. The applied modifications to Vigenère Cipher are then tested using Kasiski Examination. Resulting ciphertexts are known to have randomised characteristics, which made it difficult to guess the ciphering method used to generate the ciphertexts. Tests done using Kasiski Examination {1, 2, 4} proven that the ciphertexts passed the test, hence putting down the possibility of easy deciphering, and the modifications successfully provided a better and stronger encryption to the Vigenère Cipher.
DETEKSI KEDIPAN MATA PADA VIDEO MENGGUNAKAN OPEN CV Sajati, Haruno; Kusumaningrum, Anggraini; Utomo, Bagus Budi
Compiler Vol 6, No 1 (2017): Mei
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (311.759 KB)

Abstract

In the development of technology in the current era is one of the most rapid progress, it is marked by almost all managers of data and information has been done with the computer because of the increasingly diverse information issues handled, Detection of objects is one of the most important early stages before Done object recognition process. Eye blink detection can be used to open a new file or an application. In this research use case detection eye blinking on video using OpenCV to open notepad application. The blink detection uses the haar cascade classifier method for realtime detection and the  OpenCV Library. The first step determines the pattern 1111100000. Next enter the video sample avi format to match with a predetermined pattern. In this program the system managed to detect the eye according to the pattern by circling the eye area when the eyes are open or literate and when the eyes closed or brake there is no circle in the eye area for the correct video sample.
SISTEM PENDUKUNG KEPUTUSAN PERENCANAAN AKADEMIK DENGAN METODE BEST FIRST SEARCH ( Studi Kasus di Sekolah Tinggi Teknologi Adisutjipto ) Rina, Atika; Honggowibowo, Anton Setiawan; Retnowati, NurCahyani Dewi
Compiler Vol 1, No 2 (2012): November
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (173.072 KB)

Abstract

With the rapid growth in current technology, academic systems in higher education has been computerized. Academic who has a computerized system is considered more effective. The computerized system has can be used to plan the academic activities of students for taking Strata 1 at the College of Technology Adisutjipto. The system uses Decision Support System (DSS) to give some conditions on Best First Search (BFS) method so that the method can be used in a subsequent advisory list of the best courses in accordance with the terms that have been obtained, which will help students in making academic decisions. Of the BFS method, students are given a solution in the form of a list next semester of courses that can be taken in accordance with the terms obtained from the previous semester in the form of Performance Index and the solution was given until the end of the lecture the student and provides the calculation of the total cost of each semester.

Page 3 of 17 | Total Record : 169