Department of Information Technology: Recent submissions
Now showing items 381-400 of 1385
-
Pengaruh Perangkat Server Terhadap Kualitas Pengontrolan Jarak Jauh Melalui Internet
(Universitas Sumatera Utara, 2014)Internet greatly assist people in improving their quality of life. Almost all areas of human life can be accessed using the internet. Human aided by the internet that provides all sorts of information that they need. Along ... -
Kombinasi Hill Cipher, Vignere dan RSA dalam Hybrid Cryptosystem
(Universitas Sumatera Utara, 2014)Selection of symmetric cryptographic algorithms are designed so that the encryption decryption process requires a short time but are less secure security key and lock must be changed frequently. While on the contrary ... -
Kombinasi Algoritma Kriptografi RSA, Algoritma Fermat dan Algoritma Kompresi Huffman pada Pesan Teks
(Universitas Sumatera Utara, 2012)One of the aspects that must be considered in the process of sending messages is the security aspect, the message sender wants the message can be kept confidential from parties who are not interested, not a security issue ... -
Analisis Sentimen pada Twitter Menggunakan Text Mining
(Universitas Sumatera Utara, 2014)Twitter salah satu situs microblogging memungkinkan penggunanya untuk menulis tentang berbagai topik dan membahas isu-isu yang tejadi pada saat ini. Banyak pengguna yang melakukan posting pendapat mereka akan sebuah ... -
Analisis Aryabhata Remainder Theorem dalam Kriptografi Rivest Shamir Adleman (RSA)
(Universitas Sumatera Utara, 2012)Rivest Shamir Adleman (RSA) is the most widely used crypto systems in security applications. Cryptographic security of RSA lies in the difficulty of factoring numbers p and q to be prime factors. The larger the value of p ... -
Pengamanan Pesan Teks dengan Algoritma Elgamal dan Algoritma Pembangkit Bilangan Prima The Sieve of Eratosthenes
(Universitas Sumatera Utara, 2012)Security issues are an important aspect in the delivery of data and information. Common communication medium that can be used by anyone making it very vulnerable to interception of information by parties who are not entitled ... -
Klasifikasi Tingkat Keparahan Diabetic Maculopaty Melalui Citra Retina Menggunakan Deep Residual Network (Resnet)
(Universitas Sumatera Utara, 2022)Diabetic maculopathy (DM) is a microvascular complication that causes damage to the blood vessels in the center of the retina (macula) resulting in the build-up of fluid that causes impaired central vision. This disease ... -
Identifikasi Hypertensive Retinopathy pada Citra Fundus Retina Menggunakan Deep Belief Network (DBN)
(Universitas Sumatera Utara, 2022)Hypertension causes disease complications that can lead to death. Hypertensive retinopathy causes damage to the retina or blood circulation around the retina due to high blood pressure which can lead to blindness. Hypertensive ... -
Kombinasi Metode Tomek-Links dan Random Undersampling untuk Identifikasi Single Nucleotide Polymorphism Menggunakan Artificial Neural Network pada Genom Kedelai
(Universitas Sumatera Utara, 2022)Next Generation Sequencing (NGS) is a machine that can read Single Nucleotide Polymorphism on a genome, including the soybean genome used in this study. However, the machine has a high error rate so that more SNP candidate ... -
Perancangan Secure Login Website menggunakan Algoritma Enkripsi Xxtea
(Universitas Sumatera Utara, 2012)WEB SECURE LOGIN DESIGN USING CORRECTED BLOCK TINY ENCRYPTION ALGORITHM ABSTRACT The basic format of the login form sends the contents of user-id and password from the client to the server in plaintext format. The ... -
Metode Hybrid (Content Dan Collaborative Based) Nearest Neighbour untuk Sistem Rekomendasi Pariwisata
(Universitas Sumatera Utara, 2011)A recommendation system is an application to provide and recommend item to make desired decision by the user. Hybrid method (content-based and collaborative) nearest neighbor is proposed to solve content and collaborative ... -
Sistem Pendukung Keputusan Kredit Sepeda Motor dengan Metode Decision Tree
(Universitas Sumatera Utara, 2011)This paper shows the model of feasibility determination in motorcycle credit loans facilities. Today’s motorcycle credit loan has large amount of non perform loan (NPL). This happened because the occurrence of errors in ... -
Analisis dan Perancangan Keamanan Informasi pada Electronic Voting Menggunakan Algoritma Kriptografi Kunci Publik
(Universitas Sumatera Utara, 2012)Conventional ballot is the voting process and to make important decisions for several parties involved. But voting is very time consuming and very tiring to wait for the results of voting. e-voting is an alternative ... -
Implementasi dan Analisis Kinerja Algoritma Arithmetic Coding dan Shannon-Fano pada Kompresi Citra BMP
(Universitas Sumatera Utara, 2012)Rapid technological developments, a very important role in the rapid exchange of information. On the transmission of information in the form of the image is still experiencing problems, such as the large size of the image ... -
Permainan Word Search Puzzle pada Android Menggunakan Algoritma Backtracking
(Universitas Sumatera Utara, 2012)Word search puzzle is a game to search some words in a collection of random letters that usually arranged in a rectangular grid. Backtracking algorithm can be implemented into an application to search the words. The ... -
Peramalan Jumlah Penjualan Distributor Telur terhadap Permintaan Pasar Menggunakan Metode Average-Based Fuzzy Time Series (ABFTS)
(Universitas Sumatera Utara, 2012)Predicting or forecasting the number of sales for the coming period is important for egg distributors to increase profits, so that no shortage or surplus eggs are marketed. In this research, average-based fuzzy time ... -
Perancangan Aplikasi Belajar Hijaiyah pada Android Menggunakan Metode Rectangles Collision Detection
(Universitas Sumatera Utara, 2013)Nowadays, technology development on mobile device has growing rapidly, one of the most popular technology is Android. Android is an open platform operating system which designed for mobile device. As a technology, author ... -
Analisis Discrete Sine Transform (DST) dan Discrete Cosine Transform (DCT) pada Suara Sandi Morse
(Universitas Sumatera Utara, 2017)Voice recognition is a process to recognize the characteristics of a person's voice to recognize the speech of the person. The beginning stage a make a speech recognation system required sampling process. Interest voice ... -
AnalisisKinerja Algoritma C 4.5 dengan Pruning Menggunakan Decision Tree
(Universitas Sumatera Utara, 2016)Classification is a method that works to find a model that distinguishes data classes, so classification can predict the class label of an object that is not yet known. One method often used is the classification algorithm ... -
Teknik Kernel K-Means Clustering dan Support Vector Machine pada Sistem Evaluasi Akademik Mahasiswa
(Universitas Sumatera Utara, 2012)The evaluation of the progress of students' academic achievement at a college in general is still performed manually based on CGP A with a view of the Student Study Result Card each semester. Further the evaluation of ...