Department of Information Technology: Recent submissions
Now showing items 541-560 of 1503
-
Prediksi Trend Foreign Exchange Euro terhadap Dollar Amerika Menggunakan Jaringan Syaraf Tiruan Backpropagation
(Universitas Sumatera Utara, 2014)Pergerakan nilai forex selalu berfluktuasi setiap detiknya, oleh karena itu diperlukan suatu pendekatan dalam memprediksi besarnya nilai forex dengan tingkat keakuratan maksimum. Salah satu jenis prediksi kuantitatif ... -
Algoritma Hybrid ACO-GA untuk Meminimumkan Makespan Penjadwalan Flowshop
(Universitas Sumatera Utara, 2018)Flow shop scheduling is a ,scheduling mode! in which the job-job to be processed entirely flows in the same product direction/path. In other words, job-jobs have routing work together. Scheduling problems often arise if ... -
Algoritma Pohlig-Hellman pada Skema Three Pass Protocol
(Universitas Sumatera Utara, 2016)Three Pass Protocol is a method or technique that can be used by 2 (two) the sender and receiver of the message to communicate with each other using XOR function, problems that occur is when the communication process ... -
Pengembangan Model Bayesian Network
(Universitas Sumatera Utara, 2014)Bayesian Network (Bayesian Network) is a directed acyclic graph that used to express the dependence of the probability of causation between variables that focus on knowledge representation and inference uncertainty, it ... -
Analisis Kinerja Algoritma Clustering Fuzzy C-Means dengan Fuzzy Tsukamoto
(Universitas Sumatera Utara, 2017)Based on the analysis algorithm performance clustering models Tsukamoto Fuzzy and Fuzzy C-Means displays seyeral variables that vary in number. For grouping was done to determine the value of the performance of the algorithm ... -
Analisis Kinerja Min-Max Fitness Mutation pada Algoritma Genetika
(Universitas Sumatera Utara, 2017)Implementation of method mutations in genetic algorithms that are not coordinated properly can make declining cause on an individual fitness value. To overcome these problems do settings for use mutation methods that are ... -
Analisis Modal Aturan Keputusan Kredit Usaha Rakyat (KUR) Menggunakan Metode Fuzzy Decision Tree
(Universitas Sumatera Utara, 2016)Coordinating Ministry for Economic Affairs of the Republic of Indonesia launched a business credit (KUR) to the Indonesian people as working capital and investment financing to the debtor business productive and decent, ... -
Analisis Model Inferensi Fuzzy Tsukamoto dalam Prediksi Kondisi Jalan
(Universitas Sumatera Utara, 2016)Fuzzy logic begins with the concept of fuzzy set. A fuzzy set describing the relationship between the quantity given x and the membership function (p), which ranges between 0 and l, fuzzy provides a simple way to arrive ... -
Efisiensi Seleksi Frequent Itemsets Metode Tabel Hash Pruning pada Algoritma Apriori
(Universitas Sumatera Utara, 2016)Apriori algorithm is one of the algorithms used to find frequent item sets and association rules are trying to find knowledge. Apriori will repeat the process by finding frequent itemset repeatedly in the database and ... -
Analisis Waktu Eksekusi Algoritma Perkalian Karatsuba dan Nikhilam
(Universitas Sumatera Utara, 2016)Multiplication is a common thing which is done by everybody in daily routine. Even though, multiplication in Computer Science is not as simple as what is done by most people. This is because multiplication in Computer ... -
Optimasi Kontrol Motor Induksi Menggunakan Metode Fuzzy dan Algoritma Genetika
(Universitas Sumatera Utara, 2017)Conveyor performance in a production process of an industry is really affected in optimizing the production. The use of conveyor is cannot be separated with the conveyor driving motor, so the ultimate condition of the ... -
Analisis Patially Mapped Crossover Algoritma Genetika dalam Mengoptimalkan Pembelajaran Backpropagation Neural Network
(Universitas Sumatera Utara, 2016)Backpropagation Neural Network a computational method that is reliable and capable of accurately recognizing patterns but old in the process of training. Behind the success of backpropagation neural network as one of the ... -
Analisis Perbandingan Klasifikasi dengan Metode Decision Tree dan Naive Bayes
(Universitas Sumatera Utara, 2014)Data mining is a process to discover useful information from a collection of large databases. One of the techniques that exist in data mining is classification. By applying classification techniques on student satisfaction ... -
Pengukuran Kinerja Partially Mapped Crossover dan Cycle Crossover pada Genetic Algorithm
(Universitas Sumatera Utara, 2014)Traveling Salesman Problem (TSP) is a classical combinatorial optimization problem which is becoming a standard for testing computational algorithm. Many methods can be used to solve the TSP, one of which is a Genetic ... -
Optimisasi Metode K-NN (K-Nearest Neighbour) Menggunakan Fuzzy Logic pada Klasifikasi Data
(Universitas Sumatera Utara, 2021)Classifications data can be undertaken by using a method of K-Nearest Neighbour through proximity the distance data training with the data that are being tested. A problem was often the case in the process of data ... -
Model Prediksi Data Besar Distribusi Produk Farmasi: Analisis Kinerja Model Deep
(Universitas Sumatera Utara, 2022)As the company's business goes on, the problems in storing and processing big data will become more complex. Unorganized data can cause companies to fail in maximizing sales strategies. One approach to maximize the sales ... -
Model Pengukuran Tingkat Efisiensi Pembangunan dan Pengembangan Ict di Indonesia Berdasarkan Dea Dengan Metode CCR yang Dimodifikasi
(Universitas Sumatera Utara, 2022)Data Envelopment Analyis (DEA) is a non-parametric mathematical programming technique that is useful for measuring the efficiency of the Decision-Making Unit (DMU) of an organization. The DEA model invented by Charnes, ... -
Analisis Klasifikasi Serangan Intrusi Menggunakan Skema HGN
(Universitas Sumatera Utara, 2016)Intrusion detection is an action to monitor and analyze network traffic. In conducting monitoring and analysis, intrusion detection system should have early detection against intrusion attacks. This research uses HGN ... -
Teknik Kombinasi Algoritma One Time Pad (OTP) dan RSA untuk Mengamankan Pesan
(Universitas Sumatera Utara, 2014)Algorithm one Time Pad (OTP) is a symmetric algorithm and key length which plainteksnya same length, this has resulted in the decline in the level of security when the plaintext message is getting long. RSA is an asymmetric ... -
Penentuan Rute Terpendek antar Kabupaten dalam Provinsi Aceh Menggunakan Algoritma Hill Climbing
(Universitas Sumatera Utara, 2013)Determination of the shortest routes of land transportation is very needed by the general public. These are places where vehicles do towards the end of the beginning. Someone determine the initial places where it is ...
