Claim Missing Document
Check
Articles

Found 5 Documents
Search
Journal : Compiler

PENERAPAN METODE GERAKAN OBYEK UNTUK PENGAMBILAN CITRA DIGITAL PADA OBTION REMOTE VERSI 1.0 Ayuningtyas, Astika; Basukesti, Agus; Retnowati, NurCahyani Dewi
Compiler Vol 1, No 1 (2012): Mei
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (416.612 KB)

Abstract

Development of the world's information and communication technology-based growing rapidly. The development of these technologies has given rise to another dimension in human life, namely the need for computer use. Application of machine vision applications where a computer has the ability to understand the data in the form of image and make decisions based on data obtained from a real object, in this case is generated through the capture image from webcam.            The images (digital images) of a real object through a webcam can be done in many ways capture the object. In this research object retrieval using an object of activity is captured on the webcam through the motions of objects. Digital image acquisition is performed with the tool in the form of software (Obtion Remote Version 1.0). Obtion (Object Detection) method works with the system of comparison between that time frame the previous frame captured by the camera at the time of recording the object. Comparison of the difference in the frame will be accommodated in a place that will be used to support the execution of an object by counting the number of pixels that exceed the value of the difference in number of field values with regulator frame to frame changes in the location of the object motionObtion Remote Version 1.0 will take a digital image of the object with trigger object motion detection performed. Digital image acquisition (capture the object with a webcam) will be done automatically if the object has been successfully detected. The detected object will be stored automatically in the directory are executed as a digital image storage.
PENERAPAN EIGENFACE UNTUK COMPUTER BASED TEST (CBT) PENERIMAAN MAHASISWA BARU SEKOLAH TINGGI TEKNOLOGI ADISUTJIPTO Sajati, Haruno; Ayuningtyas, Astika; Kholistyanto, Dwi
Compiler Vol 6, No 2 (2017): November
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (447.556 KB)

Abstract

One of the development of computer technology is the availability of systems or applications that help human work everyday so that can be resolved quickly and correctly. The system, one of which is Computer Based Test (CBT). CBT is an application used for tests conducted using computers that are in the application there are some features of CBT security when working on the problem. CBT can use a stand-alone computer, a computer connected to a network or a computer connected to the internet. Facial recognition is a type of biometric application that can identify specific individuals in a digital image by analyzing and developing face patterns. In its implementation, CBT has a weakness in the security system that becomes the gap of CBT users to commit fraud, therefore required a good security system with the creation of CBT applications that use eigenface algorithm. It is necessary to have a security system that overcomes the problem that is required identification of face recognition of participants during the test so that cheating can be reduced. The results of the test using eigenface algorithm accuracy rate reached 82%, some things that affect the level of accuracy is, the intensity of light, facial position and the use of accessories on the face.
PERANCANGAN MAIL CLIENT MENGGUNAKAN MEKANISME CREATE FOLDER OTOMATIS Kusumaningrum, Anggraini; Ayuningtyas, Astika; Sipayung, Lely Delvia
Compiler Vol 6, No 1 (2017): Mei
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (900.641 KB)

Abstract

The development of computer technology and telecommunications right now has changed the way society communicates. The technology used to communicate exists since the first Internet presence, that is to say by using the electronic mail. Email is a technology that allows everyone to communicate by sending messages or files. As with other ways that can be used to read and send emails, use the email client application. Email client is an application installed on a computer device used to access the email account on an email server, the email client does not need to use a browser application. But as long as this classification on email is still done manually on the part where the file storage download. To resolve the issue ranking of emails can be done automatically according to the name of the subject of e-mail, messages or files that are entered on the e-mail client of the application can then be downloaded and the data to download are stored in the folder that corresponds to the name of the subject e-mail, so that a message or file will be stored in a folder, it gives the convenience classification for mail client application mail user electronic with the number of messages or files that are much more consistent with the existing keywords in the subject of the email. This email client application can create folders automatically when downloading messages. Then, the downloaded file will be stored in the folder corresponding to the name of the subject. The file extension downloaded * .ml, the file can be opened via the mail client application. The mail client application can run on Windows and Linux operating systems.
UNDANGAN PAPERLESS BERBASIS CLOUD COMPUTING DENGAN MEMANFAATKAN CLOUDINARY Ayuningtyas, Astika; Pramudi, Alif Restu
Compiler Vol 6, No 1 (2017): Mei
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (953.261 KB)

Abstract

Paperless is an attempt to reduce the use of paper media in the filing process, a use of paperless office technology, paperless office technology will be applied using cloud computing technology. Cloud computing is a service that provides synchronized online storage media, which can be accessed through a variety of devices such as Android smartphones. Cloud services applications built on these systems is a data storage service to take advantage of the cloudinary storage media. Cloudinary is a service that provides cloud services for image, download and CDN (Content Delivery Network). This can certainly provide convenience in the process of registering and sending out invitations electronically using paperless invitations. In addition, there is a process of checking the read (read) status will be performed by the MySQL database system to use the webservice. Paperless invitations applications can be run if the user has an e-mail account, the paperless invitations test system that have been made show the menu each function can be executed according to its input.
SIMULASI PENGENDALIAN ROUTER MIKROTIK MENGGUNAKAN ANDROID Risaldi, Moh; Ayuningtyas, Astika
Compiler Vol 7, No 1 (2018): Mei
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (684.231 KB) | DOI: 10.28989/compiler.v7i1.284

Abstract

Userman is a tool in mikrotic that serves as a network user. Userman's tools are only accessible by admin and can only be accessed via a computer device. Utilization of handheld or mobile phone device at this time the usual thing because cellular phone or handphone is as companion in carrying out everyday activities. That's what makes Hanphone is very commonplace for some people. This is because some Mobile already has the function and ability more than just the basic function. Android as an operating system that can be embedded in mobile devices have the ability to be installed applications required by the user. In this final project, the mikrotik application can be used to manage the admin that has been in the menu of user management and mikrotik application can also be successful to monitor network traffic and limit the bandwidth to the connected user.