Claim Missing Document
Check
Articles

PERBANDINGAN METODE FUZZY TSUKAMOTO DAN MAMDANI UNTUK MEREKOMENDASI NILAI SIMPANAN TABUNGAN BERDASARKAN SALDO RATA-RATA HARIAN PADA KOPERASI JASA KEUANGAN SYARIAH (STUDI KASUS DI BMT BINA IHSANUL FIKRI) Omara, Safik; Honggowibowo, Anton Setiawan; Wintolo, Hero
Compiler Vol 1, No 1 (2012): Mei
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (501.07 KB)

Abstract

Funding accumulation should be designed to attract people to save in the institution money islamic. Savings Islamic investment is to apply the system to yield a return on investment. The value of customer revenue will never be the same each month even though they are the same a mount. Therefore, we need an alternative form of information storage decisions to be based recommendations for the specific results. For the results calculated by the method of the average daily balance is multiplied by other factors such as per classification average balance bank of funds, and the ratio(%). The average balance is the accumulation of sediment balance is divided by the number of days in a month. The application of fuzzy inference systems Tsukamoto and madman will be compared to the recommended savings will be applied to the system. Fuzzy logic has a degree of  membership that represented the values 0 and 1, to be more balanced in the calculation is limited by certain factors. Factors include the amount of sediment balance and sediment balance your time to calculate the value of savings products or recommendations.Application of fuzzy Tsukamoto and  Mamdani gives an overview of the differences indetermining the final outcome of the process defuzzifikasi, so that the known method is more suitable for recommending the value of deposits with a limited output of certain values (lower and upper limit of deposits). Fuzzy calculations have been tested with analysis of mathematical calculations manually and generate the same value.ListenRead phonetically
PERANCANGAN APLIKASI CHAT TRANSLATOR BERBASIS DESKTOP UNTUK KOMUNIKASI DUA BAHASA DALAM JARINGAN KOMPUTER Prasetya, Pradana Nur; Wintolo, Hero; Retnowati, Nurcahyani Dewi
Compiler Vol 3, No 1 (2014): Mei
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (171.467 KB)

Abstract

One way of written communication is to send a message to the others. With the current technological developments, written communication can be supported by the computer and internet media so that messages sent can be delivered to target internet users in a short time and geographical distance is no longer a barrier of communication. In communicating between countries is often used in English, but that will be an obstacle when the language used to write the message was not understood by the other person and vice versa. Seeing this condition, then there needs to be an alternative media to overcome these obstacles. One of them is to design a bilingual (Indonesian-English) chat translator application. The system was created using Delphi 7 as a programming language and Oracle as Indonesian and English vocabulary storage database. Through this system, users can send messages using Indonesian or English and receive messages according to language used. The result from the design of this application indicates that the application is able to translate the text that is sent into the appropriate language which is controlled by interlocutors. So it can be a solution to communicate although with different language. However, the ability of the translator is very dependent on the current record in the dictionary table, so the translation can be developed in subsequent research to be more complete and better.
PERANCANGAN DAN PENERAPAN ALGORITMA JAWA UNTUK MENCARI JARAK ANTARA DUA BUAH KOMPUTER DALAM JARINGAN WIRELESS LAN/HOSTPOT Razikin, Khairur; wintolo, hero; Indrianingsih, Yuliani
Compiler Vol 1, No 1 (2012): Mei
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (527.637 KB)

Abstract

Wireless networks / hostspot using wave or signal transmission media. Waves or signals emitted from a device called an access point having a particular frequency. Signal beam is formed a circular pattern in which the antenna from the access point to the source signal. In a wireless network signal is captured and used a computer to be able to communicate with each other. PING technique is a method to double check the connection by sending data packets from the sending computer to the destination computer. This process can be seen from the travel time required to transmit data packets. So there is some problems how to convert time obtained from the PING into the distance. Algorithm Jawa can be used to convert units of time-based PING the wireless LAN / hostspot into the distance. Basically, two computers that are in a wireless LAN / hostspot will form a triangular pattern. This pattern will be used algorithm jawa to determine the distance between two computers within the wireless LAN / hostspot by utilizing modifications pythagorean theorem for isosceles triangular pattern and the large angle of 400.
USE VLSM (VARIABLE LENGTH SUBNET MASKING) ANDROID BASED SIMULATOR FOR ADMINISTRATIVE SUPPORT NETWORK Aji, Bimio Wahyu; Wintolo, Hero; Nugraheny, Dwi
Compiler Vol 2, No 1 (2013): Mei
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (133.783 KB)

Abstract

Administration o f networking IP addressing especially IP version 4 have a less using IP address for the limited. Through for the using by networking o f services base on TCP/IP addressing, however that can be used VLSM (Variable Length Subnet Masking) method o f subnetting addressing thorough the public area networking to divided IP addressing private it's called as sub network ID or Local Area Network (IP private). Therefore dividing have choose a calculate IP addressing o f VLSM Method used by simulator calculating IP address subnetting. The use o f goal-based subnetting android simulator to facilitate the distribution o f IP within the network administrator by using the simulator VLSM IP subnetting calculations automatically and efficiently. An application that helps administrators in calculating VLSM subnetting IP, to support network administration so that administrators can make solving the network ID into sub-networks. IP results obtained from the simulator, can be tested with VLSM on various internet network service providers obtain a quite optimal for purposes o f network administration.
KUALITAS RUNNING TEXT DALAM PEMBERIAN INFORMASI DI LINGKUNGAN KAMPUS SEKOLAH TINGGI TEKNOLOGI ADISUTJIPTO YOGYAKARTA Septianto, Rivcky; Sumarsono, Sumarsono; Wintolo, Hero
Compiler Vol 1, No 2 (2012): November
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (223.035 KB)

Abstract

Requirement about lectures information quickly, easily, accuratelly, and cheaply. To support lectures activity, such as lectures information scedules, lectures changed scedules, and the other informations based on running text with SMS Gateway in one way. In order to increase labor produktivity, data services, and information and increase computer skills in campus suroundings or college, that needs to be pursued in service enhancement effectively and efficiently, using information technology with running text based.In this application contains four interfaces, such as server application view, client application view, wireless fidelity (login hotspot) view, web view. Database design is a effort to make model of data management is still first draft. This database will be use to store data from the application.The result of whole research that can be analyze the test simulation is about mechanics work process from system over all. On the whole analyze result consist of the basic concept that built to become a system which has been discussed on the previous chapter.
OTOMATISASI PENERIMAAN DAN PENGIRIMAN PESAN DENGAN SISTEM TERDISTRIBUSI UNTUK MENDUKUNG PENYEBARAN INFORMASI AKADEMIK Setyoadi, Wangsit; Wintolo, Hero; Indrianingsih, Yuliani
Compiler Vol 1, No 1 (2012): Mei
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (402.097 KB)

Abstract

Advances in technology are increasing rapidly, especially in the field of information and communication technology provides convenience in exchanging information. One widely used communication tool today is the mobile phones which have facilities sending messages or SMS (Short Message Service). With the mobile phone application development, application technology of short message or SMS widely used for more general purposes, one of which is in the academic field. To facilitate the exchange of academic information, including financial data, grades, and exam schedules, distributed systems into tools that are able to provide and process information dynamically.To facilitate the exchange of academic information between the school and students, they invented a system that is distributed for the dissemination of academic information that can be accessed via SMS.Academic information dissemination system based on short message or SMS can enhance the effectiveness of the dissemination of information between the school and students. With a system of information exchange is expected to be faster and more controlled because the cost for all messages can be recorded.
PENERAPAN SISTEM KEAMANAN DENGAN KRIPTOGRAFI ADVANCED ENCRYPTION STANDARD (AES) DAN KEY ADMINISTRATOR PADA SINKRONISASI FILE Qurniawan, Wawan; Wintolo, Hero; Nugraheny, Dwi
Compiler Vol 1, No 2 (2012): November
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (213.077 KB)

Abstract

File synchronization is the process of homogenization or adjustment between one file at a location with other files in the event that a change to be used up and running in a system. File synchronization is generally a process of data exchange in order to have the same amount of data. To maintain the confidentiality of the data necessary to maintain services for data security.            The use of cryptographic AES (Advanced Encryption Standard) to encrypt the file and combined with the administrator as an authentication key in making additions or changes to the file is a security system that can be applied to synchronize the files so that data confidentiality will be maintained.            The results of the implementation of file synchronization application by applying the AES cryptography and key administrators who carried on the local network and the Internet as a service application data synchronization between the user and the service back-up data as manual handling if storage was damaged and can avoid the theft of data from a file synchronized.
PENERAPAN SISTEM TERDISTRIBUSI PADA TOGETHER IN A SINGLE CONNECTION (TSC) BERBASIS WEB Zuliana, Zuliana; Wintolo, Hero; Sudibya, Bambang
Compiler Vol 2, No 2 (2013): November
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (142.647 KB)

Abstract

Distributed system is a computer networking technology which can be hardware or software. In hardware distributed system by a collection of computers that are heterogeneous, being in the software system is distributed in the form of software that connects two applications in the form of client and server side. TSC method is a method that already existed before, which can be used increase the ranking o f a blog. Implementation distributed system for TSC using landing page as the intermediary. Landing page serves as a liaison between web applications or blogs are listed as a member to raise the ranking of a database on the application server side. When someone does click on landing page seoindonesia, will open a blog or other web members. Landing page so it can be used as a way to count the number of visitors to a blog or website, which in turn can increase the number o f page visits and 1 with 1 clickbutton seoindonesia for test in histats.com.
LAYANAN CLOUD COMPUTING BERBASIS INFRASTRUCTURE AS A SERVICE MENGGUNAKAN ANDROID Wintolo, Hero; Dwi Paradita, Lalu Septian
Compiler Vol 4, No 2 (2015): November
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (168.669 KB)

Abstract

Cloud computing, one form of information technologies are widely used in the field of computer networks or the Internet. Cloud computing consists of computer hardware, computer networking devices, and computer software, the cloud computing there are three services provided include (SaaS) Software as a Service (PaaS) Platform as a Service, and (IaaS) Infrastructure as a Service. Application cloud computing services in the wake of this system is a service-based data storage infrastructure as a service by using android smartphone as a storage medium, which utilizes FTP Server which is already available on the smartphone. This certainly supports the easy storage of data that utilize various types of internal and external storage on smartphones that serves as a storage server. In addition to the functions of storage available, this service can accommodate streaming function .mp3 file type. Implementation result of the system can be implemented on a local network using a wireless LAN. In addition, the results of user testing using Likert method shows the application can run and function properly
PENERAPAN ALGORITMA SAPA PADA JARINGAN AD-HOC UNTUK MENGIDENTIFIKASI KOMPUTER BERBASIS MAC ADDRESS Widyarto, Chris Tri; Wintolo, Hero; Indrianingsih, Yuliani
Compiler Vol 2, No 1 (2013): Mei
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (739.772 KB)

Abstract

Wi-Fi waves are commonly used as an intermediary in the communication relationships in the wireless network. However, the use o f Wi-Fi waves can be used in addition to getting the relationship in the network, the user is also able to detect and identify other devices by using Wi-Fi waves. Ad-hoc network is a network that can be built independently by the computer with the Microsoft Windows operating system, to enable ad-hoc device has to have an identity that is SSID, the SSID is then activate the device can be detected by other devices. Activation is done ad-hoc by the netsh command is a shell command in the Windows 7 operating system. An ID must be unique for each device as there is no dual identity, to maximize the identification process. Utilizing MAC address as an identity is used, allowing the device to be uniquely identified. In addition to the MAC address is added to the device profile in the identity o f the device for easier identification. Sapa application users can identify the device is detected, and recognize it as a co-owned devices. Scheme which is the concept o f the algorithm Sapa. Sapa application allows device activation or notebook PC with the Windows 7 operating system to be detected and detected by other devices with the Windows 7 operating system and applications are also active Sapa. Communication is established indirect communication that occurs in a single direction. Detection range can be done up to 77 meters distance.
Co-Authors . Sudaryanto Addiwinoto, Gunawan Aditya Wisnu Pratama Aditya, Reza Aditya, Reza Aji, Bimio Wahyu Amalia Farhati Andi Ahmad Iswar Ibrahim Anggit Tri Widiastuti Anggit Tri Widiastuti, Anggit Tri Anggraini Kusumaningrum Anggraini Kusumaningrum Anggraini Kusumaningrum, Anggraini Anton Setiawan Honggowibowo Anton Setiawan Honggowibowo Arief Dwi Nugroho ARIF HIDAYATULLAH Arif Hidayatullah, Arif Astika Ayuningtyas Astuti, Ellyana Mega Dewantri Bambang Sudibya Bambang Sudibya, Bambang Basuki Nugroho Susanto Basuki Nugroho Susanto, Basuki Nugroho Bimio Wahyu Aji Chris Tri Widyarto Christoporus Galih Pramudito Deny Hp., Fathul Fata Derry Purnamasari Derry Purnamasari, Derry Devia Tito Setyaningsih Dwi Nugrahenny Dwi Nugrahenny, Dwi Dwi Nugraheny Dwi Nugraheny Dwi Nugraheny Dwi Nugraheny, Dwi Dwi Paradita, Lalu Septian Evi Wahyuningsih Eviana Yulianti Saputri Fathul Fata Deny Hp. Fera Suprapti Friska Ayu Dhawara Galih Andita Sukma Gilang Wiratmaja Gregorius Ferdian F.D.Setyawan Gunawan Addiwinoto Habib Satrio Atmojo Handoko Widya Kusuma Harliyus Agustian HARLIYUS AGUSTIAN Haruno Sajati Hasibuan, Piniel Romulia Ibrahim Saleh Ibrahim, Andi Ahmad Iswar Ika Kartika Sari Ika Kartika Sari, Ika Kartika Irawaty, Mardiana Khairur Razikin Lalu Septian Dwi Paradita Lalu Suwandi Yusuf Moh.Bambang Haryo Seto Muhamad Hafish Muhammad Imam Muhammad Imam, Muhammad Muhammad Rivai Ngadiyono . Ngadiyono Ngadiyono, Ngadiyono Nurcahyani Dewi Retnowati Nurcahyani Dewi Retnowati Nurcahyani Dewi Retnowati Omara, Safik Piniel Romulia Hasibuan Pradana Nur Prasetya Pramudito, Christoporus Galih Prasetya, Pradana Nur Prasetyo Fendriyanto Prasetyo Fendriyanto, Prasetyo Pratama, Aditya Wisnu Prayogi, Yogi Priyo Pujiastuti, Asih Qurniawan, Wawan Razikin, Khairur Rivcky Septianto RIYAN ANDRIYANTO Safik Omara Saiful Bahri Salam Aryanto Saleh, Ibrahim Septianto, Rivcky Setyaningsih, Devia Tito Setyoadi, Wangsit Sudaryanto Sudaryanto Suhirman Sukma, Galih Andita Sumarsono Sumarsono Sumarsono Sumarsono Suprapti, Fera Suwito Suwito SUWITO SUWITO Syafrudin Abdie Wahyu Hamdani Wangsit Setyoadi Wawan Qurniawan Widyarto, Chris Tri Wiratmaja, Gilang Yenni Astuti Yenni Astuti, Yenni Yofita Sandra, S.Pd., M.Pd., Zico Farlin, Dr. Budiwirman, M.Pd., Yogi Priyo Prayogi Yuliani Indrianingsih Yuliani Indrianingsih Yuliani Indrianingsih Yuliani Indrianingsih Yuliani Indrianingsih Yusuf, Lalu Suwandi Zuliana Zuliana Zuliana, Zuliana