Master Theses
Master Theses
Recently added
Now showing items 101-120 of 624
-
Model Layanan Instalasi Jaringan Menggunakan Metode Zero Touch Provisioning dengan Metode Priority dan Round-Robin
(Universitas Sumatera Utara, 2023)Utilization of software-based automation technology based on the internet network distribution process is currently still relatively expensive, while the conventional way of the configuration process will result in ... -
Three Pass Protocol untuk Keamanan Kunci Menggunakan Algoritma Affine Cipher dan Kombinasi Exclusive-Or (XOR)
(Universitas Sumatera Utara, 2023)Information is a very important concern in the current technological era, especially in terms of security through the exchange of information that is so fast that it makes it easy for people to get various kinds of information ... -
Model Tingkat Kepuasan Mahasiswa Terhadap Kinerja Berdasarkan Fuzzy Tahani
(Universitas Sumatera Utara, 2013)Lecturers ' performance is considered good if they conduct lectures according to lecturing qualified standard in which the lecturers have GBPP (Teaching Guidance Broad Outline), SAP (Teaching Reference Unit), Syllabus, ... -
Pengembangan Metode Zoning untuk Pengenalan Pola Menggunakan Transformasi Slant
(Universitas Sumatera Utara, 2017)In pattern recognition, feature extraction with zoning method is considered as one of the most effective methods for extracting characteristic of the pattern. However, the handwriting pattern recognition need another ... -
Analisis Fungsi Aktivasi Sigmoid Biner dan Sigmoid Bipolar dalam Algoritma Backpropagation pada Prediksi Kemampuan Siswa
(Universitas Sumatera Utara, 2013)The backpropagation method is method which is very good to solve introduction complex designs of problem. In the backpropagation, network every unit in the hidden layer. The same thing is also hold to hidden layer. Every ... -
Prediksi Prestasi Mahasiswa Berdasarkan Nilai Ujian Nasional Menggunakan Jaringan Saraf Tiruan dengan Metode TrainBP dan TrainBPX
(Universitas Sumatera Utara, 2012)Prediction of student achievement in this research only predict based on national test scores by using the trainbp method and the trainbpx method. This research uses the input patterns of the subjects tested on the national ... -
Metode Hybrid Particle Swarm Optimization - Jaringan Saraf Tiruan Untuk Peningkatan Akurasi Prediksi Hasil Pertandingan Sepakbola
(Universitas Sumatera Utara, 2016)Hybrid is using two methods to a problem with the aim to improve their approach towards the specified target data. Hybrid PSO-ANN one optimal algorithm to solve such predictions in football matches. The process begins with ... -
Pengenalan Image Daun Menggunakan Algoritma Back Propagation dengan Fungsi Aktivasi Sigmoid Bipolar dan Tangen Hiperbolik
(Universitas Sumatera Utara, 2014)Backpropagation method (back propagation) is an excellent method that used to deal with issues such as recognition of complex patterns. This method is very popular among of the other artificial neural network. Propagation ... -
Optical Character Recognition (OCR) dengan Menggunakan Neural Network dan Feature Extraction
(Universitas Sumatera Utara, 2013)Optical character recognition (OCR) is used to translate the character (character images) into a text format. This approach has many criteria for the introduction of the character image pattern detection, one approach taken ... -
Kualitas Layanan pada Jaringan Multi-Protocol Label Switching (MPLS) dengan Metode Hierarchical Token Bucket
(Universitas Sumatera Utara, 2013)Multi-Protocol Label Switching (MPLS) technology is a new data communication technology that changes the routing process to switching process using label. In this research, simulation measurement of Quality of Service (QoS) ... -
Analisis Keamanan Pesan dengan Metode Enhanced LSB Formasi 3-3-2 dan Metode AES-256
(Universitas Sumatera Utara, 2017)Security and confidentiality of data is an important issue in the era of sophistication of information technology. To ensure the security and confidentiality of the data we need a technique that confidential information ... -
Analisis Kinerja Protokol UDP-Lite dengan Kode Hamming Menggunakan Simulator NS-2
(Universitas Sumatera Utara, 2016)User Datagram Protocol (UDP) has a smaller delay characteristic of the Transmission Control Protocol (TCP) to transmit data packets because UDP does not use the confirmation packet (acknowledgment). This causes the UDP is ... -
Kombinasi Algoritma Kriptografi Advanced Encryption Standart dengan Algoritma Blowfish dalam Pengamanan Pesan E-Mail
(Universitas Sumatera Utara, 2015)Data security in files online delivery becomes very important in the world of information itself. One way that can be done for the security of data is to encrypt the data before it is sent. Cryptographic AES (Advanced ... -
Kombinasi Algoritma Triple DES dan Algoritma AES dalam Pengamanan File
(Universitas Sumatera Utara, 2014)Cryptography is a method to secure data sent from sender to recipient. Triple DES and AES are two symmetric algorithms commonly used in Automatic Teller Machine security and Blackberry Messenger. Since both of these are ... -
Analisa Algoritma Kriptografi LUC & Rabin dalam Mengamankan Pesan
(Universitas Sumatera Utara, 2014)With the development of computer technology, is now a multi-user application on the performance of a computer, the data can be shared with other users on the computer or in a wider network. But in addition to the data ... -
Pengaruh Perangkat Server Terhadap Kualitas Pengontrolan Jarak Jauh Melalui Internet
(Universitas Sumatera Utara, 2014)Internet greatly assist people in improving their quality of life. Almost all areas of human life can be accessed using the internet. Human aided by the internet that provides all sorts of information that they need. Along ... -
Kombinasi Hill Cipher, Vignere dan RSA dalam Hybrid Cryptosystem
(Universitas Sumatera Utara, 2014)Selection of symmetric cryptographic algorithms are designed so that the encryption decryption process requires a short time but are less secure security key and lock must be changed frequently. While on the contrary ... -
Kombinasi Algoritma Kriptografi RSA, Algoritma Fermat dan Algoritma Kompresi Huffman pada Pesan Teks
(Universitas Sumatera Utara, 2012)One of the aspects that must be considered in the process of sending messages is the security aspect, the message sender wants the message can be kept confidential from parties who are not interested, not a security issue ... -
Analisis Aryabhata Remainder Theorem dalam Kriptografi Rivest Shamir Adleman (RSA)
(Universitas Sumatera Utara, 2012)Rivest Shamir Adleman (RSA) is the most widely used crypto systems in security applications. Cryptographic security of RSA lies in the difficulty of factoring numbers p and q to be prime factors. The larger the value of p ... -
Pengamanan Pesan Teks dengan Algoritma Elgamal dan Algoritma Pembangkit Bilangan Prima The Sieve of Eratosthenes
(Universitas Sumatera Utara, 2012)Security issues are an important aspect in the delivery of data and information. Common communication medium that can be used by anyone making it very vulnerable to interception of information by parties who are not entitled ...