Master Theses
Master Theses
Recently added
Now showing items 301-320 of 624
-
Penghalusan Citra Lokal Adaptif pada B-Spline Hirarki
(Universitas Sumatera Utara, 2014)Digital image processing is an important part in the field of Information Technology, especially in the field of multimedia. Digital image is obtained through the process of enlargement of the image needs to be smoothed ... -
Analisis Metode Fuzzy Analytic Hierarchy Process (FAHP) dalam Menentukan Posisi Jabatan
(Universitas Sumatera Utara, 2013)This study aims to determine positions with many criteria . In determining positions often appear the probability of every possible improper, because of the many factors that influence the assessment of existing options ... -
Semantik Suksesi Sistem Informasi Berdasarkan Populasi Teks
(Universitas Sumatera Utara, 2014)The information system success relates to the measurement of user satisfaction and information system actuators. In other words, the existence of information systems are always related to organizations or groups of ... -
Pengembangan Algoritma RC6 dalam Proteksi Transmisi Data dengan Mengkombinasikan RC5 dan RC6
(Universitas Sumatera Utara, 2013)In this study the authors developed a secret-key block cipher called the new development proposed RC6 algorithm is an evolutionary improvement of 128 bit RC6 is designed to meet the requirements of the Advanced Encryption ... -
Pendekatan Axiomatic Design dalam Fuzzy Multi Criteria Decision Making
(Universitas Sumatera Utara, 2012)An approach is needed to represent the fuzzy condition in making an objective decision by considering some fuzzy alternatives and criteria. In this research, FMCDM and axiomatic design are used to measure how the ... -
Model Profil Mahasiswa yang Potensial Drop Out Menggunakan Teknik Kernel K-Mean Clustering dan Decision Tree
(Universitas Sumatera Utara, 2012)This thesis presents a model profile of potential students who drop out. The model was compiled using kernel k-means clustering and Decision Tree. This is motivated by the existence of unequal causes students who drop out ... -
Analisis Penentuan Prioritas Penunjukan Pejabat Struktural menggunakan Metode Analytic Hierarchy Process (Ahp) (Studi Kasus Yp. Shafiyyatul Amaliyyah Medan)
(Universitas Sumatera Utara, 2014)This research particularly aims to implement the AHP method (Analytic Hierarchy Process) in the concern of formulation and decision-making process, especially in terms of designation of structural officials priority ... -
Algoritma One Time Pad pada Skema Three Pass Protocol
(Universitas Sumatera Utara, 2014)In this study the authors use the One Time Pad Algorithm on Three Pass Protocol scheme. Algorithm One Time Pad is known as a perfect algorithm and very difficult to resolve, the encryption key is used only once for a ... -
Algoritma Kriptografi Modified Aes 128 Bit dan Compressed Elgamal
(Universitas Sumatera Utara, 2016)Cryptography is the science that studies the encryption technique where data is encrypted using a key that it becomes difficult to read if someone does not have a key for decryption. One commonly used cryptographic ... -
Analisis Kinerja Multithreading pada Resilient Backpropagation
(Universitas Sumatera Utara, 2016)The process of learning neural network very important aims in order for neural network can recognize the environment. The process of learning in neural networks takes time to recognize the environment depends on its great ... -
Analisis Kombinasi Algoritma Steganografi Lsb dan Visual Kriptografi terhadap Keamanan Data
(Universitas Sumatera Utara, 2016)Security is something that is desperately needed in the delivery of the data and in the communication between the two sides, there is no guarantee that states that the communication occurs has been safe from the threat ... -
Analisis Perbandingan Online dan Offline Training pada Jaringan Backpropagation pada Kasus Pengenalan Huruf Abjad
(Universitas Sumatera Utara, 2015)This study was made for the study of neural network models are Backpropagation, in which there are methods of teaching-learning useful for us to know the identification of the problem so that it can learn the model by ... -
Analisis Kombinasi Algoritma Watermarking Modified Least Significant Bit dengan Least Significant Bit +1
(Universitas Sumatera Utara, 2015)To protect someone's copyright on digital media such as digital image watermarking technique can be done, which is a technique to insert copyright marks into digital media. Algorithms commonly used in the watermark insertion ... -
Penentuan Tingkat Kinerja Karyawan dengan Menggunakan Metode Fuzzy Multi Criteria Decision Making
(Universitas Sumatera Utara, 2014)Companies often provide incentives to employees for the performance of the employee to the company is expected to increase. Therefore the criteria specified how these employees are given incentives so that the employees ... -
Pembangkit Fungsi Keanggotaan Fuzzy Otomatis Menggunakan Neural Network
(Universitas Sumatera Utara, 2012)In this study the author used an algorithm Backpropagation Neural Network (BPNN) to generate automatically fuzzy membership functions, in order to obtain a more precise membership functions according to the data ... -
Analisis Konfigurasi Multi Protocol Label Switching (MPLS) untuk Meningkatkan Kinerja Jaringan
(Universitas Sumatera Utara, 2011)Multi Protocol Label Switching (MPLS) is one method that can be used for tuning the network to further improve network performance. By using MPLS method weaknesses that exist in traditional IP networks will be opened ... -
Pengenalan Pola dalam Fuzzy Clustering dengan Pendekatan Algoritma Genetika
(Universitas Sumatera Utara, 2011)The classification of data by pattern in a cluster to determine the cluster center based on the equality level measured by distance function. By using genetic operator mechanism, i.e. crossing and population mutation ... -
Studi Perbandingan antara Metode Probabilistic Encryption dengan Metode Rivest-Shamir-Adleman
(Universitas Sumatera Utara, 2011)A study has been made about the comparison between the methods Probabilistic Encryption with RSA method (Rivest-Shamir-Adleman). Many algorithms used in the manufacture of encryption key data, which often lead to ... -
Analisis Perbandingan Teknik Support Vector Regression (SVR) dan Decision Tree C4.5 dalam Data Mining
(Universitas Sumatera Utara, 2011)This study examines techniques Support Vector Regression and Decision Tree C4.5 has been used in studies in various fields, in order to know the advantages and disadvantages of both techniques that appear in Data Mining. ... -
Model Aturan Keterhubungan Data Mahasiswa Menggunakan Algoritma C 4.5 untuk Meningkatkan Indeks Prestasi
(Universitas Sumatera Utara, 2011)This thesis proposes the connectedness rule model of Students’ data with the student achievement in a private college. The more dominant factors that influence the student achievement is not exactly known yet. The data ...