Refine Search

New Search

Results in Journal Compiler: 189

(searched for: journal_id:(4242189))
Page of 4
Articles per Page
by
Show export options
  Select all
, Subandi Subandi, Adistya Nadia Azura, Ida Hastuti
Published: 30 April 2021
Abstract:
Wasaka Museum is one of the museums in Banjarmasin City. However, the information obtained by visitors at this time is only from short writings near the object of the image, and museum guards cannot accompany visitors to get around. Furthermore, the interest of museum visitors has also decreased due to the unavailability of adequate information, minimal services, and the impact of the COVID-19 pandemic. The purpose of this research is to develop applications using Mobile Augmented Reality Technology as a means of promotion, trying to attract visitors with AR interaction treats, and the form of virtual museum tours. The methodology used is the Agile Development Method with the type of Extreme Programming (XP). Then the A/B Testing Method is used to select the user interface design. Marker-Based Tracking is a method of detecting markers so that 3D objects can appear. The conclusion is that the selected interface design is design B with a percentage of 76.9%, all the features in the application have functioned very well, and the results of the usability evaluation with a percentage of 83.33% have an excellent predicate which means that they can be recommended for further use at the Wasaka Museum Banjarmasin. in the New Normal Era. Keywords Extreme Programming; Mobile Augmented Reality; Tourism Application; Virtual Museum Tour References Vinoto, H., Nasution, H., & Anra, H. (2016). Implementasi Markerless Augmented Reality Sebagai Media Informasi Koleksi Museum Berbasis Android (Studi Kasus : Museum Kalimantan Barat). Jurnal Sistem dan Teknologi Informasi, 4(2), 239-245. Nugraha, I. G. A., Putra, I. K. G. D., & Sukarsa, I. M. (2016). Rancang Bangun Aplikasi Augmented Reality Museum Bali Berbasis Android Studi Kasus Gedung Karangasem dan Gedung Tabanan. Lontar Komputer – Jurnal Ilmiah Teknologi Informasi, 7(2), 93-103. Laswi, A. S., & Aman, A. (2018). Implementasi Augmented Reality pada Museum Batara Guru Kompleks Istana Langkanae Luwu. ILKOM – Jurnal Ilmiah, 10(2), 144-151. Kato, H., Billinghurst, M., Poupyrev, I., Tetsutani, N., & Tachibana, K. (2002). Tangible Augmented Reality for Human Computer Interaction. Journal of the Society for Art and Science, 1(2), 97-104. Kato, H., & Billinghurst, M. (1999). Marker Tracking and HMD Calibration for a Video-based Augmented Reality Conferencing System. In proceeding of the 2nd IEEE and ACM International Workshop on Augmented Reality (IWAR’99), 1-10. Syahidi, A. A., Tolle, H., Supianto, A. A., & Arai, K. (2018). BandoAR: Real-Time Text Based Detection System Using Augmented Reality for Media Translator Banjar Language to Indonesian with Smartphone. In proceeding of the 5th IEEE International Conference on Engineering Technologies and Applied Sciences (ICETAS’18), 1-6. Syahidi, A. A., Tolle, H., Supianto, A. A., & Arai, K. (2020). AR-Child: Analysis, Evaluation, and Effect of Using Augmented Reality as a Learning Media for Preschool Children. In proceeding of the 5th IEEE International Conference on Computing Engineering and Design (ICCED’19), 1-6. Syahidi, A. A., Subandi, & Mohamed, A. (2020). AUTOC-AR: A Car Design and Specification as a Work Safety Guide Based on Augmented Reality Technology. Journal of Technological and Vocational Education, 26(1), 18-25. Subandi, Syahidi, A. A., Joniriadi, & Mohamed, A. (2020). Mobile Augmented Reality Application with Multi-Interaction for Learning Solutions on the Topic of Computer Network Devices (Effectiveness, Interface, and Experience Design). In proceeding of the 3rd IEEE International Conference on Vocational Education and Electrical Engineering (ICVEE’20), 1-6. Pressman, R. S. (2010). Software Engineering A Practitoner’s Approach (Seventh Edition). New York: The McGraw-Hill Companies Inc. Syahidi, A. A., Tolle, H., Supianto, A. A., & Hirashima, T. (2019). Educational Media Design for Learning Basic Programming in Branching Control Structure Material Using Problem-Posing Learning Model. KINETIK: Game Technology, Information System, Computer Network, Computing, Electronics, and Control, 4(4), 325-336. Syahidi, A. A., Supianto, A. A., & Tolle, H. (2019). Design and Implementation of Bekantan Educational Game (BEG) as a Banjar Language Learning Media. International Journal of Interactive Mobile Technologies, 13(03), 108-124. Syahidi, A. A., Tolle, H., Supianto, A. A., & Hirashima, T. (2019). TOLSYASUPI-EduMed: Development of Educational Media Using the Problem-Posing Learning Model for Basic Programming Subjects. Journal of Information Technology and Computer Science, 4(2), 137-155. Lewis, J. R., & Sauro, J. (2017). Revisiting the Factor Structure of the System Usability Scale. Journal of Usability Studies, 12(4), 183-192. http://dx.doi.org/10.28989/compiler.v10i1.864 Refbacks There are currently no refbacks.
Anton Setiawan Honggowibowo, Asih Pujiastuti, Yuliani Indrianingsih, Dhea Yogi Anugerah
Published: 30 April 2021
Compiler, Volume 10, pp 27-34; https://doi.org/10.28989/compiler.v10i1.972

Abstract:
Transportation has become a human need today, one of which is air transportation, namely airplanes. In order for the aircraft to be used properly and comfortably, it is necessary to carry out routine maintenance, especially before flying. Problems caused by aircraft engines are sometimes small problems that do not require a high level of knowledge. To overcome this, maybe someone who has very basic knowledge of aircraft engines can do it. But sometimes these problems also require a high level of expertise regarding these components so that they require technicians or experts to repair them. Through this application, users can consult the system such as consulting with experts to find out the symptoms that occur on the plane and find solutions to the problems encountered. The expert system built using the Hill Climbing Heuristic method resulted in 72.67% when tested on respondents.
Harliyus Agustian, Agung Nugraha
Published: 30 April 2021
Abstract:
The function of the Adisutjipto-Aerospace Institute of Technology (ITDA) library is to provide borrowing and reimbursement services for books insured by members of the library. The books which increase in number each year occupy a lot of space in the library, it is therefore necessary to study it so that the form of this book is no longer physical but digital or paperless to be able to be stored on a server computer. This form of library is known as a digital library or e-library. The electronic library is a modern library as a place which provides a source of educational information with more convenience and security. The flow in the application is not very different from the flow in the manual library. Security becomes an important part of an application, by limiting network access, accessing PDF documents and implementing PDF Viewer using the PDF.js library by rendering PDF documents on a canvas capable of blocking illegal downloads. Based on the test results, the electronic library application can work properly. The speed of opening a PDF document is influenced by the speed of the server, the content contained in the PDF and the size of the PDF file.
Shoffan Saifullah, Andiko Putro Suryotomo, Bambang Yuwono
Published: 30 April 2021
Abstract:
Image segmentation is a concept that is often used for object detection. This detection has difficulty detecting objects with backgrounds that have many colors and even have a color similar to the object being detected. This study aims to detect fish using segmentation, namely segmenting fish images using k-means clustering. The segmentation process is processed by improving the image first. The initial process is preprocessing to improve the image. Preprocessing is done twice, before segmentation using k-means and after. Preprocessing stage 1 using resize and reshape. Whereas after k-means is the contrast-limited adaptive histogram equalization. Preprocessing results are segmented using k-means clustering. The K-means concept classifies images using segments between the object and the background (using k = 8). The final step is the morphological process with open and close operations to obtain fish contours using black and white images based on grayscale images from color images. Based on the experimental results, the process can run well, with the ssim value close to 1, which means that image information does not change. Processed objects provide a clear picture of fish objects so that this k-means segmentation can help detect fish objects.
Dwi Nugraheny, Riski Mulia Prakasa, Novera Marsda Riny
Published: 30 April 2021
Abstract:
In computer-based learning process, there are communication process that goes between user; students and the sistem. Calculating perimeter of plane figures in edugame is a learning media that can help students to study and play just in the same time. This edugame is intended to help students understanding and calculating the perimeter of various plane figures way easier with the visualization. Source of the data is from primary and secondary datas of 7th Tematic Elementary School book and several journals about the theory of calculating plane figures. The application’s trial is using questionnaire with correspondents of 17 expert users that are elementary school teachers, with the average result 2.8, which is the interval score criteria as ”good”. Meanwhile, the second trial using youtube as a platform has 64 viewers and 16 comments. The average comments by users are ”This application is very useful”.
Kadek Dwi Pradnyani Novianti, I Wayan Oka Sukardiyasa, I Putu Dodit Setiawan
Published: 30 April 2021
Compiler, Volume 10, pp 43-50; https://doi.org/10.28989/compiler.v10i1.973

Abstract:
Bisma Informatika is one of the educational institutions with Diploma education level in Denpasar that serves certification services for people who want to take certification expertise, especially those engaged in Information and Computer Technology. In order to serve optimally, Bisma Informatika applies registration which can be done by the computerized system so that the participant's data can be stored properly. After observing the use of the system at the time of participant registration, an initial conclusion can be drawn that many data fields cannot be understood by the user so they must ask the officer on duty. The data fields in question such as the choice of certification class are not clear because it does not include the implementation time, the unaccompanied participants who come from the common line (so can not include the student identification numbers), telephone numbers that cannot be entered if they exceed the capacity of the permitted number, and inconsistent field filling instructions. This shows that the usability aspect of the registration system is not being considered properly. This study evaluates the interface design and features of the Bisma Informatika certification registration system by considering the context and user needs. In an effort to find out the context and user needs, a Website Usability Evaluation (WEBUSE) questionnaire was used. The results of the WEBUSE questionnaire showed that the four categories which have a good usability level, only content, organization and readability categories are obtained. Keywords Usability; User Interface; Webuse Full Text: PDF References L. D. Farida, “PENGUKURAN USER EXPERIENCE DENGAN PENDEKATAN USABILITY ( STUDI KASUS : WEBSITE PARIWISATA DI ASIA TENGGARA ),” pp. 6–7, 2016. N. A. H, R. I. Zainal, and Afriyudi, “EVALUASI WEBSITE PEMERINTAH KOTA PRABUMULIH MELALUI PENDEKATAN WEBSITE USABILITY EVALUATION ( WEBUSE ),” J. Ilm. Betrik, vol. 10, no. 01, pp. 1–6, 2019. F. Aziz, Irmawati, D. Riana, J. D. Mulyanto, D. Nurrahman, and M. Tabrani, “Usability Evaluation of the Website Services Using the WEBUSE Method (A Case Study : covid19.go.id),” in Journal of Physics : Conference Series, 2020. H. Simatupang, S. Widowati, and R. R. Riskiana, “Evaluasi Website Dinas Kebudayaan dan Pariwisata Kota Bandung Menggunakan Metode WEBUSE dan Importance-Performance Analysis ( IPA ),” in e-Proceeding of Engineering, 2020, vol. 7, no. 3, pp. 9804–9821. Andiputra and R. Tanamal, “ANALISIS USABILITY MENGGUNAKAN METODE WEBUSE PADA WEBSITE KITABISA.COM,” Bussiness Manag. J., vol. 16, no. 1, pp. 11–15, 2020. I. K. Dewi, Y. T. Mursityo, and R. R. M. Putri, “Analisis Usability Aplikasi Mobile Pemesanan Layanan Taksi Perdana Menggunakan Metode Webuse dan Heuristic Evaluation,” J. Pengemb. Teknol. Inf. dan Ilmu Komput., vol. 2, no. 8, pp. 2909–2918, 2018. T. K. Chiew and S. S. Salim, “Webuse: website usability evaluation tool,” Malaysian J. Comput. Sci., vol. 16, no. 1, pp. 47–57, 2003. N. Oktaviani, “Analisa Website Media Elektronik Di Sumsel Melalui Penerapan Usability Pada Evaluasi Metode Webuse,” in Seminar Nasional Inovasi Teknologi, 2017, pp. 223–230. A. L. Silaen, B. Purwanggono, and W. Budiawan, “PERANCANGAN SISTEM INFORMASI TRACER STUDY DENGAN MENGGUNAKAN FAST (FRAMEWORK FOR APPLICATION SYSTEM TECHNOLOGIES),” Ind. Eng. Online J., vol. 4, no. 3, 2015. A. Farisi, A. Algharizah, P. Studi, S. Informasi, and W. Method, “Penerapan Custom Core System Class pada Pengembangan Sistem Informasi Manajemen Donasi,” JTSI, vol. 1, no. 1, pp. 95–105, 2020. http://dx.doi.org/10.28989/compiler.v10i1.973 Refbacks There are currently no refbacks.
Achmad Safruddin, Arief Hermawan, Adityo Permana Wibowo
Published: 2 November 2020
Compiler, Volume 9, pp 101-108; https://doi.org/10.28989/compiler.v9i2.834

Abstract:
Sentiment analysis is a process for identifying or analyzing people's opinions on a topic. Sentiment analysis analyzes each word in a sentence to find out the opinions or sentiments expressed in the sentence. The opinions expressed can be in the form of positive or negative opinions. Twitter is one of the most popular social media in Indonesia. Twitter users always discuss various kinds of topics every day. One of the things discussed on Twitter and which has become a trending topic several times is about public figures. This study discusses the analysis of positive or negative sentiments towards public figures based on tweet data carried out by text processing. The results of text processing are classified using a backpropagation neural network. Tests were carried out using 69 test data, resulting in an accuracy of 62.3%, with 43 correct classification results.
Thomas Ken Darmastono, Bahrul Jalaali
Published: 2 November 2020
Abstract:
The multiphase modeling of a droplet in a multiphase system is considered becoming a fundamental problem in fluid dynamics. A complex understanding of droplet behavior is critical to reveal a deeper insight into a more complex multiphase system. Droplet behavior studies are necessary to obtain a better understanding of solving multiphase problems in both the science and industrial aspect. The droplet behavior is characterized by a non-dimensional number such as the Eötvös number. In this study, numerical simulation was performed using the Lattice Boltzmann method. Parametric studies of Eötvös number was done. The parametric study of the Eo number is obtained using LBM. Based on the results obtained, it is concluded that the gravitational force influences the downwards rate of the droplet. Furthermore, the shape of the droplet during falling was depended on the Eo number as well. The higher Eo number means higher gravitational force, hence the velocity of the droplet is increasing as well as the reaction force of surface tension. This study is beneficial to give a deeper explanation of multiphase phenomena as well as contribute to the modeling of multiphase phenomena using an alternative numerical method of LBM.
Asih Pujiastuti, Anggraini Kusumaningrum, Muhammad Ali Sofyan
Published: 2 November 2020
Compiler, Volume 9, pp 109-120; https://doi.org/10.28989/compiler.v9i2.824

Abstract:
At an event, the event organizer usually requires guest stars as performers. Event organizers often find it difficult to find a guest star that suits their needs for their event. The purpose of this research is to build an e-marketplace application as a web-based decision support system that can be used to find alternative decisions to choose guest stars according to the criteria using product weighting methods. The weighted product method is one of the methods that can be applied to web-based decision support system applications for determining guest stars in e-marketplaces. There are three criteria used to determine guest stars in this e-marketplace, these criteria are the type of show, price and location. As for the alternatives that were tested, there were nine alternatives consisting of guest stars in Yogyakarta. Functionality testing is carried out using the black box method and the result is that all functions and validation buttons on the e-marketplace can function properly. The result of calculation using the weighted product method is the guest star with the highest yield is Frengki Sermadi with a value of 0.135234, while the guest star with the lowest result is Sanggar Titik Dua with a value of 0.083222.Keyword: Decision Support System, Weighted Product, E-marketplace, Guest star, Website. Keywords Decision Support System, Weighted Product, E-marketplace, Guest star, Website. Full Text: PDF (Bahasa Indonesia) References Nugroho, A. S.2016. E-Commerce Teori Dan Implementasi.Ekuilibria.Yogyakarta. [2] Kardianawati, A., Haryanto, H., & Rosyidah, U. 2016. Implementasi Konsep Appreciative Inquiry Dalam Model Gamifikasi Pada E-Marketplace. In Seminar Riset Teknologi Informasi (SRITI) (pp. 122-127) [3] Turban, E., Aronson, J. E., & Liang, T. P. (2005). Sistem Pendukung Keputusan dan Sistem Cerdas. Yogyakarta: Andi. [4] Kusrini, M. K., & Kom, M. 2007. Konsep dan Aplikasi Sistem Pendukung Keputusan. Andi Offset. Yogyakarta [5] Pujiastuti, A., & Ardiansyah, F. (2019). Decision Support System for The Weaning of Rex Rabbit Using Simple Additive Weighting (SAW) Method. Compiler, 8(1), 71-80. [6] Honggowibowo, A. S., Pujiastuti, A., & Suryanto, S. (2017). Sistem Pendukung Keputusan Pemilihan Destinasi Wisata Favorit di Propinsi YOGYAKARTA dengan Metode Weighted Product (Wp) Berbasis Android. Compiler, 6(2). [7] Yoon, K. P., & Hwang, C. L. 1995. Multiple Attribute Decision Making: An Introduction (Vol. 104). Sage publications. [8] Nofriansyah, D., Kom, S., & Kom, M. 2015. Konsep Data Mining Vs Sistem Pendukung Keputusan. Deepublish. [9] Kusumadewi, S., Hartati, S., Harjoko, A., & Wardoyo, R. 2006. Fuzzy Multi-Attribute Decision Making (Fuzzy MADM). Graha Ilmu. Yogyakarta [10] Hartono, J. 2005. Analisis dan Desain Sistem Informasi: Pendekatan Terstruktur Teori Dan Praktek Aplikasi Bisnis. Andi. Yogyakarta http://dx.doi.org/10.28989/compiler.v9i2.824 Refbacks There are currently no refbacks.
Dwi Nugraheny, Yuliani Indrianingsih, Aldio Bima Saifullah
Published: 2 November 2020
Compiler, Volume 9, pp 1-8; https://doi.org/10.28989/compiler.v9i2.780

Abstract:
Perceptions about the quality of education are the ability to provide an assessment of the superiority of an educational service that can produce academic and non-academic excellence for students by reffering to input, the process of outcomes and the impact it causes. One of the non-academic service on institutions to users, especially students is a website. One of the vision of educational institutions is to provide service to students electronically through website and be expected that the college website can provide the best possible information to students. This study discusses how to measure the website quality of Adisutjipto College of Tehcnology (STTA) using 3 (three) dimensions; Usability, Information Quality and Service Interaction. This research is a descriptive study with a survey method. The research instrument used a questionnaire. The research subjects were 50 STTA students. The results of the measurement survey which are affected by those three dimensions shows that the quality of the STTA’s website is in the “Medium” category. Keywords Website Quality, Usability, Information Quality, Service Interaction. Full Text: PDF (Bahasa Indonesia) References Sallis, E. (2014). Total quality management in education. Routledge. Rosandich, T. J. (2011). Information technology and sports: looking toward Web 3.0. The Sport Journal, 14(1), 1-13. Dix, A., Dix, A. J., Finlay, J., Abowd, G. D., & Beale, R. (2003). Human-computer interaction. Pearson Education.Arifin, S. R. (2018). Pengukuran kualitas layanan website Universitas Tadulako menggunakan metode WebQual. Register: Jurnal Ilmiah Teknologi Sistem Informasi, 4(2), 125-136.Pearson, M. (2008). Sistem Informasi Manajemen. Salemba. Jakarta, 9. Kothainayaki, S., Sivakumaren, K. S., & Gopalakrishnan, S. (2012). User preferences on university websites: a study. Library Philosophy and Practice, 1. Puspitasari, D., & Widyobroto, B. P. (2013). Kajian Kepuasan Terhadap Website Universitas Airlangga: Studi Komparasi antara Pengguna Internal dan Pengguna Eksternal/Potensial. Under Graduates Thesis. Universitas Gadjah Mada. Taddeo, C., & Barnes, A. (2016). The school website: Facilitating communication engagement and learning. British Journal of Educational Technology, 47(2), 421-436. Abdullah, D., Jayaraman, K., Kamal, S. B. M., & Md Nor, N. (2016). A conceptual model of interactive hotel website: The role of perceived website interactivity and customer perceived value toward website revisit intention. Procedia Economics and Finance, 37(16), 170-175. Nugraheny, D. (2016, November). Analisis User Interface dan User Experience pada Website Sekolah Tinggi Teknologi Adisutjipto Yogyakarta. In Conference SENATIK STT Adisutjipto Yogyakarta (Vol. 2, pp. 183-187). Wijaya, T. (2011). Manajemen kualitas jasa. Jakarta: PT. Indeks, 143. Zeithaml, V. A., Berry, L. L., & Parasuraman, A. (1996). The behavioral consequences of service quality. Journal of marketing, 60(2), 31-46. Muhsin, A., & Zuliestiana, D. A. (2017). Analisis Pengaruh Kualitas Website (Webqual) 4.0 Terhadap Kepuasan Pengguna Bukalapak Di Kota Bandung. eProceedings of Management, 4(3). Barnes, S. J., & Vidgen, R. (2003). Measuring web site quality improvements: a case study of the forum on strategic management knowledge exchange. Industrial management & Data systems. Akbar, P. S., & Usman, H. (2006). Pengantar Statistika Edisi Kedua. Jakarta: PT Bumi Aksara. Suharsimi, A. (2006). Prosedur penelitian suatu pendekatan praktik. Jakarta: Rineka Cipta. Sugiyono, M. P. P. P. K. (2007). Kualitataif dan R&D, Bandung: Alfabeta, 2010. Sugiyono, Metode Penelitian Kuantitatif kualitatif dan R&D Bandung: Alfabeta. BPS. 2017. Jumlah Perguruan Tinggi, mahasiswa dan tenaga edukatif (Negeri dan Swasta ) di Bawah Kementriaan Pendidikan dan Kebudayaan Menurut Provinsi tahun ajaran 2014/2015. https://www.bps.go.id/statictable/2015/09/14/1839/jumlah-perguruan-tinggi-mahasiswa-dan-tenaga-edukatif-negeri-dan-swasta-di-bawah-kementrian-pendidikan-dan-kebudayaan-menurut-provinsi-2013-2014-2014-2015.html Dafid, D., & Novita, D. (2018). Metode WebQual 4.0 Untuk Analisis Kualitas Web Pembelajaran. JTKSI (Jurnal Teknologi Komputer dan Sistem Informasi), 1(2), 17-21.Yodi, Y. (2018). Analisis Kualitas Situs Web Batampos Menggunakan Metode WebQual 4.0. Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi), 2(2), 591-596. http://dx.doi.org/10.28989/compiler.v9i2.780 Refbacks There are currently no refbacks.
Samen Anjum Arani, Rashed Ibn Nawab, Tanvir Rahman, Moniruz Zaman
Published: 2 November 2020
Abstract:
The unprecedented outbreak of COVID-19 has become a grave concern worldwide because of its highly infectious nature. Besides extensive research on developing vaccine or medicine to prevent this virus attack, many technology-based solutions are also getting more importance as no one knows till date how to put a full stop on it. Being first conceptualized in 2008, blockchain technology gained enormous popularity in the cryptocurrency domain. However, nowadays, blockchain has also become popular in the healthcare domain as a privacy-preserving and data authenticity technique. The primary goal of our experiment is to develop a framework which can utilize the features of permissioned blockchain and maintain the fully controlled sharing of confidential health record to exhibit the health status and COVID-19 history of a patient using a mobile QR code based solution. So, the administrative team of any public place can be aware of the health condition of any people who are using this platform to prevent the unaware and hidden contagion of COVID-19. This article is the first of its kind to propose such a method to aid in solving this crisis. In our experiment, we have shown that Hyperledger Fabric as a base technology along with a robust user registration algorithm and data accessibility can solve the problem under consideration with a minimal health record of the patient. The proposed architecture also offers the patient more control over the health record, where the healthcare service provider assures the authenticity of the data, and the intrinsic feature of the blockchain technology makes it immutable.
Andika Bayu Saputra
Abstract:
Scheduling lectures at academic institutions especially the Faculty of Engineering and Information Technology General Achmad Yani University Yogyakarta is still done semi-manually with the help of Microsoft Excel and takes days to determine the days and space and hours of lectures, while in making schedules must be done optimally and fast because the schedule will be used for lecture activities each semester. In preparing lecture scheduling, it can be done by applying methods that are often used. One of them is using a genetic algorithm which is one of the right algorithms to solve complex search and optimization problems. Genetic algorithms can find the best solution from a broad set of candidates and have many optimum points. In other words, genetic algorithms provide solutions to scheduling problems to minimize collision schedules with coding stages, determine initial population values, determine chromosome values at random, determine fitness values for minimize the broken schedule, then select the roulette wheel, cross-move one-point crossover, then perform value coding mutations. This research is expected to be able to contribute knowledge about the application of genetic algorithms to overcome problems in the scheduling field Keywords Genetic Algorithms, scheduling system, lectures. References Saputra, A.B. and Cahyono, A., 2018. APLIKASI MONITORING CAPAIAN KOMPETENSI PESERTA DIDIK DI SMA KOLOMBO YOGYAKARTA. Angkasa: Jurnal Ilmiah Bidang Teknologi, 10(2), pp.172-179. Hartadi, R. and Hidayat, A. (2016) ‘Perancangan Aplikasi Penjadwalan Mata Kuliah (Studi Kasus : STMIK Provisi Semarang)’, Jurnal Bianglala Informatika, 4(1), pp. 31–40. Josi, A. (2017) ‘Implementasi Algoritma Genetika Pada Aplikasi Penjadwalan Perkuliahan Berbasis Web Dengan Mengadopsi Model Waterfall’, Jurnal Informatika: Jurnal Pengembangan IT, 02(02), pp. 77–83. doi: 10.30591/JPIT.V2I2.517.G554. Ni Luh Gede Pivin, S., I Made, S. and Suta, D. (2016) ‘Penerapan Algoritma Genetika Untuk Penjadwalan Mata Pelajaran’, Journal of Applied Intelligent System, 1(3), pp. 220–233. Paranduk, L. et al. (2018) ‘Sistem Informasi Penjadwalan mata kuliah menggunakan algoritma genetika berbasis Web’, in, pp. 46–50. Puspaningrum, wiga A., Djunaidy, A. and Vinarti, R. A. (2013) ‘Penjadwalan Mata Kuliah Menggunakan algoritma Genetika di jurusan sistem informasi ITS’, Jurnal teknik POMITS, 2(1), pp. 127–131. Suhartono, E. (2015) ‘Optimasi Penjadwalan Mata Kuliah dengan Algoritma Genetika ( Studi Kasus di AMIK JTC Semarang )’, Infokam, 2, pp. 132–146. Suprayogi, D. A. and Mahmudy, W. F. (2015) ‘Penerapan Algoritma Genetika Traveling Salesman Problem with Time Window: Studi Kasus Rute Antar Jemput Laundry’, Jurnal Buana Informatika, 6(2), pp. 121–130. doi: 10.24002/jbi.v6i2.407. Yudistira, A., Djamal, E. C. and Yuniarti, R. (2017) ‘Optimalisasi Penjadwalan Audit di Inspektorat Daerah Kabupaten Cianjur Menggunakan Algoritma Genetika’, Seminar Nasional Aplikasi Teknologi Informasi (SNATi), pp. 1907–5022. http://dx.doi.org/10.28989/compiler.v9i1.656 Refbacks There are currently no refbacks.
Muhammad Zainal Abidin, Dwi Nugraheny, Yuliani Indrianingsih
Compiler, Volume 9, pp 9-18; https://doi.org/10.28989/compiler.v9i1.633

Abstract:
This study is intended to assess the user interface and user experience on the Adisutjipto College of Technology website using the mergesort method and compared with the quicksort method in finding the highest value of several variables or elements that are categorized as good or good in order to improve the quality of the Adisutjipto College of Technology website. The results of the study show that the quicksort method is faster in the process of calculating questionnaire data than the merge method with an average time record of 0.476667 seconds for the quicksort method and 0.576667 seconds for the mergesort method. The results of the comparison of the two methods on the questionnaire website to assess the accuracy in terms of user interface and user experience on the Adisutjipto College of Technology website, that the mergesort method is more accurate than the quicksort method, the Usability category scores the highest, while the Expressive aesthentics category has the lowest value
Daewu Gus Bintara Putra, Anggraini Kusumaningrum
Abstract:
- Drones as Unmanned Aerial Vehicle that are controlled using remote control are experiencing better development. The speed of the drone that cannot be accessed on the remote control can be determined through a client-server based application. The client side application, named Mydrone, is placed on the drone while on the server side, named Admin Drone, on earth. Mydrone and Admin Drone are applications made in this research based on andorid. This application on the client and server is used to monitor the speed of flying drones by using the Google Play Service library. Data sent from the client to the server in realtime by using Google Firebase. From the tests carried out it can be seen the speed of the drone when flying horisontal ly, while when flying vertically the speed is not detected. Battery capacity will also decrease when the speed of the drone gets faster, this is seen in the data when the speed is 8,741 km / h, the electricity demand taken from the battery is 31%.
Salam Aryanto
Abstract:
The development of animation technology is currently very rapid, but to animate a three-dimensional object beforehand must be done by preparing the framework manually. Also in the real world, when two objects collide, they do not penetrate each other. When a collision occurs, the interaction force will change the original state of two objects, such as position, trajectory, and direction. The purpose of this study focuses on the rigid body in a three dimensional rigging model arrangement for car animation scenarios on a bumpy road. This approach focuses on reducing manual movement by animators when animating three-dimensional car models. The result is to make a car animation on a bumpy road well, then the arrangement of the framework on the car has a mass = 1946 kg and gravity = -981.001 cm / s2. As well as knowing the results of the animated motion of the car on a bumpy road with a tolerance of distance between the car's wheels and the trajectory of 4.44 cm without applying a rigid body to the arrangement of the car's frame. While the motion animation of the car on a bumpy road with good results where the tolerance of the distance between the car wheels and the track is 0.045 cm after applying a rigid body to the arrangement of the car's frame. Keywords rigid body, arrangement, rigging, animation, vehicle References [1] Yu, Y., Yang, J., Zan, X., Huang, J., & Zhang, X. (2017). Research of Simulation in Character Animation Based on Physics Engine [Research article]. https://doi.org/10.1155/2017/4815932 [2] Zulnaidi. 2007. Metode Penelitian. Universitas Sumatera Utara. Medan. [3] Fazeli, N., Tedrake, R., & Rodriguez, A. (2018). Identifiability Analysis of Planar RigidBody Frictional Contact. In Robotics Research (pp. 665–682). Springer, Cham. https://doi.org/10.1007/978-3-319-60916-4_38 [4] Chatterjee, A., & Ruina, A. (1998). Two Interpretations of Rigidity in Rigid-Body Collisions. Journal of Applied Mechanics, 65(4), 894–900. https://doi.org/ 10.1115/1.2791929 [5] McHenry, R. R. (2014). The Role of Vehicle Dynamics Simulation in Highway Safety Research. ASME 16th International Conference on Advanced Vehicle Technologies, 1-16. [6] Aryanto, S. (2018). Implementasi rigid body pada rigging terhadap animasi dinamis model kendaraan tiga dimensi. Angkasa: Jurnal Ilmiah Bidang Teknologi, 10(1), 77-88. [7] Kurniadi, Y., Liliana, L., & Purba, K. R. (2016). Pembuatan Aplikasi Simulasi Ujian Praktik Pengambilan Surat Izin Mengemudi Kendaraan Roda Empat. Jurnal Infra, 4(2), 110-115. [8] Hidayat, D., Istiyanto, J., Sumarsono, D. A., & Marta, A. (2017). Investigasi Gaya Kontak/Impak Pada Main Landing Gear Pesawat Komuter Dengan Pendekatan Multi-Body Simulation (MBS) Rigid Models. Jurnal Teknologi Dirgantara, 15(1), 1-10. [9] Djuliandri, F. R., Triwiyatno, A., & Setiyono, B. (2016). Desain Sistem Kontrol Fuzzy Untuk Kendali Sudut Pitch Pada Model Pesawat Konvensional Dengan Tipe Fixed Wing. Transient, 5(2), 343-348. [10] Syamsuar, S. (2017). Metoda Short Takeoff Landing (Studi Kasus Prestasi Terbang Takeoff-Landing Pesawat Udara Turbo Prop CN235). Warta Ardhia, 41(2), 49-58. http://dx.doi.org/10.28989/compiler.v9i1.650 Refbacks There are currently no refbacks.
Ulil Amri Nasron, Muhammad Habibi
Abstract:
Businesses began to shift from the marketing process that used to use conventional media to switch to using the internet and social media. This is because the cost of marketing using the internet and social media is cheaper than using conventional media. The problem that is often faced by businesspeople when marketing on social media is that they rarely see a marketplace that is becoming a trend and is being discussed by consumers on social media, so the marketing process is carried out less than the maximum. This study aims to analyze conversation trends related to the marketplace on the Twitter platform. The method used in this study is the K-Means Clustering method. Based on the results of the study found that the application of the K-Means Clustering method can produce sufficient information as a basis for consideration of businesspeople in choosing a marketplace. Marketplace trend analysis results show that Shopee, Lazada, and Tokopedia are highly discussed marketplaces on Twitter. Keywords Marketplace; Text Mining; K-Means; Twitter; Clustering References Sunyoto, D. (2011). Analisis Regresi dan Uji Hipotesis. Yogyakarta: Caps Publishing.Databoks. (2019). Berapa Pengguna Media Sosial Indonesia? Retrieved November 30, 2019, from https://databoks.katadata.co.id/datapublish/2019/02/08/berapa-pengguna-media-sosial-indonesiaClinten, B. (2019). Pengguna Aktif Harian Twitter Indonesia Diklaim Terbanyak. Retrieved November 30, 2019, from https://tekno.kompas.com/read/2019/10/30/16062477/pengguna-aktif-harian-twitter-indonesia-diklaim-terbanyakHabibi, M. (2018). Analisis Konten Jejaring Sosial Twitter dalam Kasus Pemilihan Gubernur DKI 2017. Teknomatika, 11(1), 31–40.Cahyo, P. W. (2017). Model Monitoring Sebaran Penyakit Demam Berdarah di Indonesia Berdasarkan Analisis Pesan Twitter. Universitas Gadjah Mada Yogyakarta.Habibi, M., & Cahyo, P. W. (2019). Clustering User Characteristics Based on the influence of Hashtags on the Instagram Platform. IJCCS (Indonesian Journal of Computing and Cybernetics Systems), 13(4), 399–408. https://doi.org/10.22146/ijccs.50574Cahyo, P. W. (2018). Klasterisasi Tipe Pembelajar Sebagai Parameter Evaluasi Kualitas Pendidikan di Perguruan Tinggi. Teknomatika, 11(1), 49–55.Maulida, L. (2018). Kunjungan Wisatawan Ke Objek Wisata Unggulan Di Prov . Dki Jakarta Dengan K-Means. JISKa, 2(3), 167–174.Kelik Nugroho, A. (2018). Image Quantization in Psoriasis Using K-Mean Clustering. In Prosiding Seminar Nasional Teknologi Informasi dan Kedirgantaraan (SENATIK) (Vol. IV, pp. 183–189). https://doi.org/10.1017/CBO9781107415324.004Habibi, M., & Sumarsono. (2018). Implementation of Cosine Similarity in an automatic classifier for comments Program. JISKa (Jurnal Informatika Sunan Kalijaga), 3(2), 38–46. https://doi.org/http://dx.doi.org/10.14421/jiska.2018.32-05Sebastiani, F. (2002). Machine Learning in Automated Text Categorization. ACM Computing Surveys (CSUR), 34(1), 1–47.Habibi, M. (2017). Analisis Sentimen dan Klasifikasi Komentar Mahasiswa pada Sistem Evaluasi Pembelajaran Menggunakan Kombinasi KNN Berbasis Cosine Similarity dan Supervised Model. Departemen Ilmu Komputer dan Elektronika, Fakultas Matematika dan Ilmu Pengetahuan Alam. Universitas Gadjah Mada.Kalra, V., & Aggarwal, R. (2018). Importance of Text Data Preprocessing & Implementation in RapidMiner. Proceedings of the First International Conference on Information Technology and Knowledge Management, 14, 71–75. https://doi.org/10.15439/2017km46Siqueira, H., & Barros, F. (2010). A Feature Extraction Process for Sentiment Analysis of Opinions on Services. Proceedings of the III International Workshop on Web and Text Intelligence (WTI).Manning, C. D., Raghavan, P., & Schutze, H. (2009). An Introduction to Information Retrieval. Cambridge, England: Cambridge University Press. https://doi.org/10.1109/LPT.2009.2020494Nisha, N., & Jai Kaur, P. (2015). A Survey of Clustering Techniques and Algorithms. 2nd International Conference on Computing for Sustainable Global Development (INDIACom), 3014–3017. http://dx.doi.org/10.28989/compiler.v9i1.579 Refbacks There are currently no refbacks.
Rama Sahtyawan, Arief Ikhwan Wicaksono
Abstract:
Control systems in the field of technology, electronic devices must be controlled. But there are still those who oppose if the room does not have a place anywhere, where there is no one at home, other people forget to change the lights, it is very inconvenient if you have to go home, even though if the lights are left activated there will be a waste, from which It was stated that a light monitoring device was provided using the Internet-based (IoT) tea-based Relay module using the NodeMcu ESP 8266 microcontroller which has been equipped with a wifi module, so that the led lights can be monitored by the user in realtime so using the IoT Program platform using the Blynk application, which can be controlled via handphone, In the system implementation, a display is made using Blynk. There are 4 on and off switch buttons which are used to facilitate and activate the Led lights. In this research, the control of Led using blynk is done 10 times. Led control testing is used to see each procedural function running correctly as expected, the results of tests that have been done get the results of 10x experiments that have been done to get 2 x interrupted experiments in the LEDs needed to connect the wifi network Keywords NodeMCU ESP 8266, Relay, (IoT), Blynk, Led References Yatin, S. F. M., Hussain, H. M., Fitri, K. N. K., Aman, K., & Jamil, N.S. (2018). The Internet of Things (IoT) in Information Agencies.INTERNATIONAL JOURNAL OF ACADEMIC RESEARCH IN BUSINESS AND SOCIAL SCIENCES,8(9). Kortuem, G., Kawsar, F., Fitton., D., Sundramoorthy, V.: Smart objects as building blocks for the internet of things. Internet Computing, IEEE, vol. 14, no.1, 44--51 (2010). Kortuem, G., Kawsar, F., Fitton., D., Sundramoorthy, V, (2010), Smart objects as building blocks for the internet of things. Internet Computing, IEEE, vol. 14, no.1, 44--5. Lin K, Chen M, Deng J, Hassan MM, Fortino G (2016) Enhancedfingerprinting and trajectory prediction for iot localization in smartbuildings. IEEE Trans Autom Sci Eng 13(3):1294–1307. Chasta, R., Singh, R., Gehlot, A., Mishra, R. G., & Choudhury, S. (2016). A Smart Building Automation System. International Journal of Smart Home. Omprakash, K. S. (2011). Wireless Home Security System With Mobile. International Journal of Advanced Engineering Technology. Furdik, K., Lukac, G., Sabol, T., & Kostelnik, d. P. (2013). The Network Architecture Design for an Adaptable IoT-based Smart Office Solution. International Journal of Computer Networks and Communications Security.Farisqi Panduardi, Endi Sailul Haq, (2016). Wireless Smart Home System Menggunakan Raspberry Pi Berbasis Android. Jurnal Teknologi Informasi dan Terapan, Vol. 03, No. 01, Juli-Desember 2016 ISSN:2354-838X. Kusumaningrum, A., Pujiastuti, A., & Zeny, M. (2017). Pemanfaatan Internet Of Things pada Kendali Lampu. Compiler, 6(1). Oktaviyani, E. D., Christina, S., & Ronaldo, D. (2019, December).Keywords Search Correction Using Damerau Levenshtein Distance Algorithm. In Conference SENATIK STT Adisutjipto Yogyakarta (Vol. 5, pp. 167-176). Khosyi'in, M., Nugroho, A. A., & Yulistiyanto, A. (2019, December).Three-Phase Power Data Logger Using IEM 3255 Schneider Module Based OnInternet Of Things (IOT). In Conference SENATIK STT Adisutjipto Yogyakarta(Vol. 5, pp. 263-274). http://dx.doi.org/10.28989/compiler.v9i1.627 Refbacks There are currently no refbacks.
Sita Dewi Kusumaningrum, Hari Setiaji, Wildan Maulana
Published: 7 October 2019
Abstract:
Modern philanthropic organizations are responsible for the use of social resources. However, some of them are facing several managerial issues, including inadequate database management and lack of accountability. To support the documenting process and to improve the management of funds, these organizations need a computer-based information management. This qualitative action research using prototyping method aimed at designing a management information system for a philanthropic organization which focus on providing education access for disadvantaged students in Yogyakarta. The process of designing management information system in the case study was applying a prototyping method since not every organization including a philanthropic organization could explicitly define the information needed to support their business process. This prototype was designed based on organization’s requirements so that users can obtain any information needed easily. The management information system prototype could provide assistance for a philanthropic organization in managing and documenting all activities in the organization.
Nur Hidayati, Muhammad Fachrie, Adityo Permana Wibowo
Published: 7 October 2019
Abstract:
Since the first election policy was enacted simultaneously, it does not mean that it does not have potential problems, instead it causes other problems, which require extra time and energy in doing recapitulation. Simultaneous elections consist of presidential elections, DPR elections, Provincial DPRDs, City / Regency DPRDs, DPD, the more they are elected, the more influential is the time of voting and the time of vote recapitulation. The longer the voting time is done by the voters, the longer the recapitulation time. The longer time of recapitulation results in the fatigue of KPPS members which triggers inaccurate work and prone to manipulation and fraud so that it can damage the quality of elections. This study aims to determine the estimated time needed for voting for ballots in elections using the Multilayer Perceptron Artificial Neural Network (ANN) approach. The resulting time estimate is based on the time of the voter in the voting booth. The results of this study indicate that ANN with the Multilayer Perceptron Algorithm can calculate the estimated time required for ballot balloting by producing the best combination of learning parameters with 4 hidden neurons, learning rate 0.001, and 2000 epoch iterations resulting in an RMSE value of 108,015 seconds.
Arif Budiman, Paradise Paradise
Published: 7 October 2019
Abstract:
Information technology that is increasingly developing today must be balanced with the similarity of information data. Information security is obtained by applying cryptographic techniques, Vigenere Cipher is a key symmetry algorithm that uses a substitution technique that uses two letters encoding the original message. Vigenere cipher has a weakness because it uses short keywords and its use will be repeated. In this study, we will discuss the modification of the vigenere cipher algorithm and one time pad by adding a key elongation process as done in the RC6 algorithm. The results of the study will produce new variations in data security by combining the vigenere cipher algorithm and vernam cipher with key expansion algorithm RC6
Yulius Nahak Tetik, Friden Elefri Neno, Dony Ariyus
Published: 7 October 2019
Abstract:
Along with the development of technology and information today, data security is a problem that needs to be done to maintain the confidentiality of data or information both personally and within an organization. Cryptography is one of the sciences or arts that learns about how to secure data or information from irresponsible parties who want to destroy important data in the form of text and image files. This research, data security technique uses two algorithms, namely steganography to enter text in image media using LSB (Least Significant Bit) method and Binary XOR used to convert messages to binary with XOR keywords and generate pixel values of messages from 8 bits of images with LSB (Least Significant Bit). After encrypted the image will be sent to the user, and to view the original data, the user must decrypt the data with the message key and retrieve the LSB (Least Significant Bit) value, from the encrypted image.
Mutaqin Akbar, Arita Witanti, Indah Susilawati
Published: 7 October 2019
Abstract:
In this paper, computational acceleration of color image segmentation using fuzzy c-means (FCM) algorithm has been presented. The color image is first converted from the Red Green Blue (RGB) color space to the YUV color space. Then, the luma (Y) information values are grouped according to the desired number of clusters using the FCM algorithm. The FCM algorithm is implemented on a Graphical Processing Unit (GPU) using the Compute Unified Device Library (CUDA) library which is developed by NVidia to speed up the computing time. Images used in this research are red blood cell images, geometry images and leaf images. The results of segmented images processed using GPU were seen identic to the results of segmented images processed using the Central Processing Unit (CPU). The computational time of the FCM algorithm can be accelerated by speed-up to 5,628 times faster and the average speed-up of all simulations done is 5,517 times faster.
Yuliani Indrianingsih, Haruno Sajati, Bayu Sugara
Published: 7 October 2019
Abstract:
Fire extinguishing system in placing reservoirs there are still many officers who do not know the location so that they can implement computerized technology so that firefighters can work to maximize the information technology made by the author well. Mobile-based reservoir mapping system application developed using Geofence method. The main purpose for this application that officers can easily find the location of the reservoir closest to the location of the fire and where officers can also find out the location of the reservoir distance from the fire. The accuracy of testing results with Google maps where the accuracy is very precise to the location of the water source or reservoir. Testing using a smartphone comparison from Android 4.1 Jelly Bean version to Android 7.0 Nougat can run with distance results in the application using google maps, get the same results and where there is a test version of Android V4.4 Kitkat that did not work because RAM does not support this application. Testing in the form of a black box method where this method tests every function contained and the test is functioning and running as smoothly as possible where the system is functioning properly with success rate 100%.
Adri Priadana
Published: 7 October 2019
Abstract:
At present, the use of video cameras is not only limited to documenting events but is also used for surveillance systems. Changes in lighting that occur in the surveillance area is one of the problems that result in a false alarm on the surveillance system. Illumination Invariant Change Detection is a method for detecting image changes on images. This study aims to determine the performance of the Illumination Invariant Change Detection method to detect image changes in night vision surveillance cameras. The Illumination Invariant Change Detection method does not work well for detecting image changes on a night vision camera under dark lighting conditions at an average value of Lux 0 with an infrared lamp on. The accuracy of the application of the method to detect image changes on night vision cameras is 80% with the selection of the threshold value of the detection of image changes that is 75000 pixels.
Arief Ikhwan Wicaksono, Chanief Budi Setiawan
Published: 7 October 2019
Abstract:
Wireless network distribution is the right solution to disseminate network services in places and areas that are difficult to reach by cable networks. The effort to add a number of access points is intended to increase the coverage area of a network service so that the signal coverage can be even and broad. The development and improvement of wireless network users have made management and user management activities not easy, because of the way wireless technology works in the operational delivery of its packages, sorting and dividing the packages into 3 parts. Among them are packaged in the form of management, control, and data. Whereas if the management prioritizes data without considering management and control, the emergence of vulnerability in network distribution activities will occur when users are increasingly populated. To facilitate the flexibility and mobility of centralized wireless network users, this study utilizes VLANs that will be implemented at OSI Layer 2 to facilitate the classification of user-profiles, subnetting, securing, and roaming features between access point devices and their users. This research in its testing uses QoS parameters that refer to ITU G.165 / G.168 to monitor the quality of services provided. The parameters used in the measurement of interconnection include Throughput, Packet Loss Ratio, Latency, Jitter, and Delay. If the test is declared successful and complete, it is continued by analyzing and evaluating the results of the study in the hope that the system will successfully cluster the users based on the user characteristic dataset
Haruno Sajati, Anggraini Kusumaningrum, Nur Hanifah
Published: 7 October 2019
Abstract:
Viola Jones method uses the file classifier to object detection. The training process to create object classifier file requires very high computer resources and time which is directly proportional to the amount of training data. The amount of training data determines the accuracy of object detection. The long training process is caused because the computer has low specifications and the distribution of Haartraining files will speed up the process of vector file formation, minimize errors when cutting Haar features on positive objects and also minimize errors that occur during the training process. The problems that arise next are how to overcome this so that a better knowledge is obtained. This study provides analysis results of the process of merging knowledge acquisition and its effect on the accuracy of object detection using the Viola-Jones method with the final result undetected object decrease 52.62% and object detected increase 23.78%
, Arief Ikhwan Wicaksono
Compiler, Volume 8, pp 27-34; https://doi.org/10.28989/compiler.v8i1.430

Abstract:
Because the growing of mobile technology in recently days, technology practitioners are required to be able to create a variety of devices and media that support the mobile technology. Application developers compete to create mobile applications that have a variety of features, including video call, voice sending, image sending or text messaging. Developing of mobile applications have an impact on using of Short Message Service, although using of Short Message Service began to shift, but the Short Message Service feature cannot be abandoned, because Short Message Service is a standard feature carried by mobile devices (mobile phones). For this reason, we need to develop Short Message Service Broadcast middleware as an intermediary for Short Message Service communication between web technology and mobile devices. This technology is using for disseminating information between systems that have been built with mobile devices via Short message service. Broadcast system will produce information about new student admissions, That will be received directly by Senior High School Students through their mobile phones. The Middleware can send message broadcast in real time to more than 500 cellular numbers automatically with an average time of 13 seconds for one message. The advantage of using this technology is direct configuration with Python Back-End. Meanwhile, Technology for message inbox still requires further configuration.
Catur Budi Waluyo, Alber Erik, Yenni Astuti
Published: 29 March 2019
Compiler, Volume 8, pp 1-10; https://doi.org/10.28989/compiler.v8i1.424

Abstract:
Today's wireless communication system is a trend for the information society. This is inseparable from communication needs with high mobility and low costs. One of them is the Wireless Local Area network with the IEEE 802.11 standard. Wireless LAN is a communication technology that uses radio wave transmission media by utilizing free space as a transmission line. The transmitted signal is strongly influenced by distance, frequency, transmitter power, receiver sensitivity, and antenna gain. A loss occurs in the process of transmitting data from the sender to the recipien. In order to no loss that occurs, it requires a good performance, and a wide coverage area. The purpose of this study is to analyze the QoS data, calculate the coverage area, receiver power, and compare the results of theoretical calculations with the measurement results. The analysis results show the average throughput for each data rate of 6 Mbps, 15 Mbps and 35 Mbps at 383.8 kbps, 328.2 kbps and 329.8 kbps. The average delay is 5.28 ms, 4.81 ms and 4.66 ms. The average packet loss is 2.83% ms, 2.66% ms and 2.16% ms. The average jitter is 0.036 ms, 0.032 ms and 0.014 ms.
Published: 29 March 2019
Compiler, Volume 8, pp 81-93; https://doi.org/10.28989/compiler.v8i1.429

Abstract:
The keyword is one or a group of words used by websites to improve your visibility on search engines. The selection of keywords from the results displayed by Google's keyword planner still not match the expectations of the webmaster, so that needs to be determined the choice and order of priority keywords which will be optimized beforehand. Therefore, a system that supports webmasters in making decisions on choosing keywords that will be optimized previously for search engines is needed. The methods used in this research is Analytical Hierarchy Process (AHP) to find the weighting parameters and Simple Additive Weighting (SAW) applied to find the final value and rank. The results showed that the system is running as expected, so it can be used as a basis in support of the decision of the webmaster in determining the priority of the optimization of keywords that will be worked out with the results of the comparison between the manual system with 100%.
Published: 28 March 2019
Compiler, Volume 8, pp 105-118; https://doi.org/10.28989/compiler.v8i1.428

Abstract:
Many companies need a storage system that can be accessed in real time by all parts of the company. Most digital data storage methods today still use conventional methods where data is stored on an external hard disk or public cloud. Storage with external hard disk media makes accessing data difficult and has the risk of data loss when storage media is damaged. On the other hand, the storage method using public cloud requires an internet connection with large bandwidth requirements and the company still has to spend a budget on renting it. This study aims to design digital data storage methods using a private cloud that can be accessed in real time by all parts of the company without having to spend a budget on hiring a storage media and renting an internet connection with large bandwidth requirements. A private cloud was built using OpenStack Swift as an object storage service provider and Rclone as a cross-platform computer data management application. The results of this study are the creation of a private cloud that runs object storage services using Swift storage objects with relatively light and high scalability to meet the needs of storing data effectively and efficiently. A private cloud-based data storage media with relatively light and high scalability to meet data storage needs. Data storage media that can be accessed easily without having to use an internet connection with large bandwidth requirements.
Nurcahyani Dewi Retnowati, , Frencha Talantha
Published: 25 March 2019
Compiler, Volume 8, pp 45-56; https://doi.org/10.28989/compiler.v8i1.431

Abstract:
Learning about changes in air flow on jet engines requires a clear understanding because there are parts of the jet engine that work according to their functions and are interconnected. People often have difficulty understanding learning about changes in air flow in the jet engine and also about the brayton cycle. This study aims to make a simulation that explains the changes in air flow in a jet engine with a three-dimensional animated form in order to improve understanding of learning about it. The process of making three-dimensional simulations uses animation modeling techniques, texturing, lighting, editing, and rendering. In modeling and texturing on jet engines following the Brayton cycle. The three-dimensional simulation results show that this simulation can be run by computers with Windows 7 and Windows 8 operating systems, and from the results of user test analysis 80.2% agree that this three-dimensional simulation can be understood and can explain changes in airflow in jet engines.
, Dwi Nugraheny, Harliyus Agustian
Published: 25 March 2019
Compiler, Volume 8, pp 35-44; https://doi.org/10.28989/compiler.v8i1.432

Abstract:
Yogyakarta's strong culture makes Yogyakarta one of the tourist areas frequented by tourists, both foreign tourists and local tourists. The Visitors come from various groups, for example visitors who come with family or individuals. A game model is needed that can facilitate the child in remembering the tourist icons in Yogyakarta through a Game Running Challenge that is made as attractive as possible and can run on the Windows operating system. The game running challenge application can provide convenience to users who are children aged 6-10 years to get to know and know the most famous icons in Yogyakarta through a game. So that it can be an educational medium that has a pattern of learning by doing learning.
Published: 22 March 2019
Compiler, Volume 8, pp 95-104; https://doi.org/10.28989/compiler.v8i1.425

Abstract:
Regions having higher level of welfare do not always have better indicator values than other regions having lower level of welfare. The problem is the lack of information related to the indicator values needed to determine the health level. Therefore, clustering using health data becomes necessary. Data were clustered to see the maximum or the minimum level of similarity. The clustered data were based on the similarity of four morality indicator values of the regional health level. Morality indicator values used in this research are infant mortality rate, child mortality rate, maternal mortality rate, and rough birth rate. The method used is Agglomerative Hierarchical Clustering (AHC) - Complete Linkage. Data were calculated using Euclidean Distance Equation, then Complete Linkage. Four clustered data were grouped into two clusters, healthy and/or unhealthy. The result, combining from all clusters into two large clusters to see healthy and unhealthy results.
Asih Pujiastuti, Fachrul Ardiansyah
Published: 25 February 2019
Compiler, Volume 8, pp 71-80; https://doi.org/10.28989/compiler.v8i1.422

Abstract:
Weaning REX rabbits child is one of the keys to success in raising or cultivating rabbits. Unsuitable weaning can result in very high mortality or mortality risks, while weaning for too long results in decreased productivity and the possible marriage of children with rabbit parent. The research done is to design and build the application of decision support system (DSS) with Simple Additive Weighting method (SAW) with 5 criteria as supporting of DSS calculation that are body weight (gram), body length (cm), still breastfeeding or not, already independent for food or not and Gender. The webased DSS application created is tested by using the calculation system compared with research data. Based on the test of 36 rabbit children which is derived from previous research results obtained showed that the application of the DSS are built 100% the same result.
Published: 25 February 2019
Compiler, Volume 8, pp 57-70; https://doi.org/10.28989/compiler.v8i1.415

Abstract:
Sign Language is a language which prioritizes manual communication, body language and lip movement for communication. People who usesign language for communication aredeaf and mute people. Sign language in Indonesia is Sistem Isyarat Bahasa Indonesia (SIBI) and Bahasa Isyarat Indonesia (BISINDO). BISINDO has a unique clause pattern that isSOPA (Subject, Object, Predicate, Adverbial). The clause pattern of BISINDO is just for deaf and mute people who know and understand it. Because there are some different structures between Indonesian language and BISINDO, itis neededlearning media which can translate from Indonesian language to BISINDO. Finie State Automata (FSA) is a method which is able to recognize pattern sentence classification in Indonesian language. FSA method is NSA (Non-DetermisticFinie State Automata) that is otomata with characteristics as a state. NFA is used to give introducing structure pattern sentence in Indonesian language. Sentence pattern which is produced from NFA produces eight sentences pattern which are arranged as requisites ofBISINDO translation. The result of research which is experimented by sign language researchersas many as 90% can translate well and appropriate with BISINDO sentence pattern, 10% explain that it is not appropriate with translation of sentence pattern and sign language model. Based on the data, it can be known that media of BISINDO sign language learning based on web using method of translation automata can be used for learning media.
Haruno Sajati, Harliyus Agustian,
Published: 18 February 2019
Compiler, Volume 8, pp 19-26; https://doi.org/10.28989/compiler.v8i1.343

Abstract:
The use of the internet, which is currently increasing dramatically, certainly brings the convenience of finding information. The increase in internet usage also eventually gave rise to cybercrime crimes, one of which was by spreading a URL or fake site to steal someone's personal data. The research done is how to build an Android-based application that can detect the security of a URL. The goal is that internet users, especially social media, can avoid cybercrime crime that wants to steal personal data. Making an application uses the Regular Expression method to analyze each line of the Webpage Source Code in the URL based on 8 criteria taken from the World Wide Web Consortium (W3C). The application was then tested with 10 phishing-charged URLs and compared with Kaspersky, McAfee, and AdBlock applications. Based on the results of trials and comparisons, applications that have been made are able to detect 6 or 60% of the 10 URLs. Kaspersky and McAfee applications can detect 70%, while AdBlock only detects 3 or 30% of 10 URLs that contain phishing.
Wildansyah Reza Fahlevi, Indro Lukito, Haruno Sajati
Published: 15 February 2019
Compiler, Volume 8, pp 11-18; https://doi.org/10.28989/compiler.v8i1.318

Abstract:
Aviation requires a very high level of security and safety, so that there is no problem that can harm various parties, one of the things that must be considered is about the transportation and handling of Dangerous Goods material. Existing handling system on the flight of dangerous goods systems where outside there is still a lot of risk of handling errors until there is data inaccuracy that can harm various parties, because almost all handling done manually. In addition, the plane does not want to delay and does not want to insert dangerous goods into the plane, so to anticipate the problem conditions, built a system that performs faster, easier and accurate handling, where the system uses PHP programmer language and utilize Telegram API as media Client Server. The built tool explains how to identify packaging, calculations and documents, this tool has reliability with the ability to calculate and identify faster than the manual way with average calculations whose value is significantly different. The values obtained by manually counting which is about 175 Minutes 8 Second or equivalent to 2 Hours 55 Minutes 8 Second and counting with the system about 94 Minutes 44 Seconds or equivalent to 1 Hour 34 Minutes 44 Seconds, then more than 46% the results are different.
Published: 2 October 2018
Compiler, Volume 7, pp 99-106; https://doi.org/10.28989/compiler.v7i2.271

Abstract:
Currently 3D modeling has been many developed and widely applied to various fields of industry, one of the modelling techniques is a polygonal modelling technique that can be applied to games with 3D graphics. Games that are currently considered as some entertainment media can only be used as entertainment media to train agility and concentration by making it an interactive game with good visuals. The manufacture of 3D helicopter model aims to produce helicopter models that can be applied to the game Motor Mabur. From the test results of Motor Mabur game that is uploaded on the game site itch.io got the number of views 84, download 30, rating 4, collections 1, comment 10, impressions 110 and ctr 0.91 %.
Afrizal Triantoro, , Asih Pujiastuti
Published: 2 October 2018
Compiler, Volume 7, pp 132-140; https://doi.org/10.28989/compiler.v7i2.280

Abstract:
In general, video compression only compresses video files without compressing the audio files in them. This results in the compression process not being maximized.This study discusses the process of compressing video and audio files to get maximum compression. The application built is a web-based video compression software utilizing FFmpeg to do the compression process by breaking down the original video which has a resolution of 720 to 4 files, namely 720, 480, 360, and 240 resolutions. The test is done by comparing the compression results only to video files and compressing to video and audio and there is a 1-2 MB file size difference, whereas when compared to the original file, there is a 5-20 MB size difference. In addition to conducting this test also performed compression testing on different devices and obtained relatively similar results on all devices. Test the image quality on the compressed file obtained the image quality results in the standard video compression below 30dB results.
Published: 2 October 2018
Compiler, Volume 7, pp 85-90; https://doi.org/10.28989/compiler.v7i2.372

Abstract:
The need for efficient, stable, fast and reliable network access is influenced by network quality, one of the factors influencing network quality is the management of network devices, while the network devices that are enforced are the Lancard, cable, Switch, Router, Wifi Access Point and Compuitary System . In this study researchers will focus on the influence of Multilayer Switch network devices for data transfer speeds on computer networks. Data transfer speed at layer 2 text data, image data, video data faster 0,85 % than for speed tranfers on layer 3 text data, image data, video data.Keyword: Network, Switch Multilayer, Data Tranfer, Osi Layer
Arief Ikhwan Wicaksono,
Published: 2 October 2018
Compiler, Volume 7, pp 76-84; https://doi.org/10.28989/compiler.v7i2.369

Abstract:
Redundancy and robustness are the most common problems in a wireless network distribution system, network system problems that are not able to handle coverage areas in a large / wide coverage, so that the network users are easily disconnected from the connection and out of the server radius. These problems are caused by topology and wireless network distribution methods that are not in accordance with the needs and coverage of its users. However, adding a number of access points en masse to expand the network without being based on appropriate applied methods, is not necessarily able to minimize complaints from network users. Starting from the problems described in the previous paragraph, in this study a wireless distribution mesh system topology (WDS mesh) will be built to improve utility and network usage in the area / radius of the area between access points using wireless lines and minimize cable requirements which are generally the main constraints in network deployment and installation to areas that are difficult to reach. The topology built in this research will implement the wireless routing protocol that results from the analysis and observation process to expand the expansion of service areas to places that are difficult to reach. The wireless routing protocol method used in this study is the Made Mesh Easy (MME) method which is one of the developments of the Interior Gateway Routing Protocol (IGRP) method. Evaluation of the wireless routing protocol in the WDS mesh network topology will be carried out periodically to obtain the results of the analysis that will be used to re-configuring and re-routing to maintain the quality of the network remains realiable. Mesh clients will give feedback on the quality of service obtained based on observations according to IEEE 802.11 standardization. The parameters used are: Througput, Packet Loss Ratio, Latency, Jitter, MOS, Post Dial Delay and Echo Cancelation (EC)
Dwi Nugraheny,
Published: 2 October 2018
Compiler, Volume 7, pp 123-131; https://doi.org/10.28989/compiler.v7i2.380

Abstract:
Interactive learning media is the media more effectively so that the user can feel the learn more practical yet fun and stimulating for users desirous of learning. The pattern is the process of recognizing an object based on data that already exists to distinguish various patterns with different size and geometry of each pattern is obtained. The purpose of this thesis was to design an interesting learning media and interactive, in particular to facilitate the child TK Aba Surya Melati get to learn identifying pattern and calculating geometry objects. Based on testing performed, the results obtained to learn identifying pattern 80% and calculating geometry objects is 65%.
, Agung Priyanto
Published: 2 October 2018
Compiler, Volume 7, pp 141-148; https://doi.org/10.28989/compiler.v7i2.367

Abstract:
Blood pressure is one of the vital sign which widely used as a parameter for medical examination. In some cases likes hypertension, cardiovascular disease or routine examination of pregnant woman, blood pressure test which performed frequently become an important thing. Based on those cases, hence an availability of blood pressure measurement devices will become significant. Thus, in this research, we developed a prototype od digital blood pressure measurement device by using Arduino Uno microcontroller and Android based mobile application. In general, Arduino Uno was equipped with pressure sensorMPX5050DP, those devices will be used for blood pressure measurement. Then the result will be sent and displayed to mobile application. Data transmission between hardware and mobile application was done by using bluetooth module
, , Fatimatuzzahroh Fatimatuzzahroh
Published: 2 October 2018
Compiler, Volume 7, pp 114-122; https://doi.org/10.28989/compiler.v7i2.378

Abstract:
Three-dimensional animation is widely used in various needs, one of its applications can be used as a medium for information on Trans Jogja bus tour line. This information media is useful for Trans Jogja bus users in knowing bus routes so that it is easier to use Jogja Trans buses. In the design of three-dimensional animation, the Trans Jogja bus route uses Paths techniques in the 3D Blender software and in making the application display using Construct 2 software. The design is then implemented in the form of animated videos. The 3D animation application of the Trans Jogja Bus route that is published on the itch.io site gets as many as 115 views and that downloads as many as 127.
Published: 2 October 2018
Compiler, Volume 7, pp 91-98; https://doi.org/10.28989/compiler.v7i2.368

Abstract:
In recent days, customer care is one of the pivotal aspects in business environment. Quick and reliable response to any of customer question was highly correlated to customer satisfaction and obviously affect the conversion rate of any kind of products or services offered to them. Jogja Sewa Camera is a small company which the main business is to rent a camera. That company serve no less than 25 booking request and questions about the product they offered to the customer. With the limitation of operational staff, the work for responding the customer booking request and question is a bit overwhelmed. Thus, an automated mechanism was built in this research to help the company to handle the customer service. In this research, a chatbot based on Line Messaging Platform was developed for automatic customer service. This chatbot can answer any of frequent or common question and booking request from the customer.
Published: 2 October 2018
Compiler, Volume 7, pp 107-113; https://doi.org/10.28989/compiler.v7i2.315

Abstract:
Creation of 3D object can use a variety of software, one of them using the software Blender. As for the methods in the creation of 3D objects lowpoy and highpoly, among others. Visualization is the process of delivery of information is presented in a 3D visual object so that it looks more interesting and more real, therefore made Building visualization SD Agape Wonosobo which is expected to be utilized by the Foundation for the help the depiction of the building be constructed SD Agape. Creation of 3D objects in this research method using lowpoly. From the results of testing done 3D visualization applications can help visualize building SD Agape will be built, the time you access it based on Browser used most quickly using the Firefox Browser, while based on computers with different time specifications have been influenced from the processor and ram are available the higher faster access time specification, this visualization applications can not be run in an unsupported Browser WebGL.
Page of 4
Articles per Page
by
Show export options
  Select all
Back to Top Top