Faculty of Computer Science and Information Technology: Recent submissions
Now showing items 161-180 of 2633
-
Pemodelan Pergerakan Self-Balancing Cube pada Permukaan Berotasi Berdasarkan Kecepatan Sudut dan Akselerasi Menggunakan Sequential Neural Network
(Universitas Sumatera Utara, 2024)Self-balancing Cube is a device that is able to maintain its own balance by utilizing a reaction wheel control system. By utilizing the action-reaction principle, the reaction wheel can correct the position of the ... -
Segmentasi Nasabah Berbasis Recency, Frequency, Monetary, Variety and Duration (RFMVD) Menggunakan K-Means Clustering
(Universitas Sumatera Utara, 2024)In banking, maintaining customer retention and customer satisfaction are important. Effective customer segmentation can be a strategic tool to improve customer loyalty and business performance. This research can assist ... -
Klasifikasi Intent pada Chatbot Pembelajaran Tenun Ulos dengan Menggunakan RASA Framework dan BERT Language Model
(Universitas Sumatera Utara, 2024)Ulos is an important cultural heritage of North Sumatra that should be preserved. This can be accomplished by making knowledge about Ulos easily accessible to users. An approach that can be utilized in this case is the use ... -
Pengenalan Bahasa Isyarat Indonesia Dinamis Menggunakan Long Short-Term Memory
(Universitas Sumatera Utara, 2024)Sign language is a way for people with special needs, or people with disabilities, to communicate. Sign Language Recognition (SLR) is the field of research and technology focused on developing computer systems that can ... -
Pre-Processing Data Admisi dan ICU Rumah Sakit untuk Prediksi Transfer ICU
(Universitas Sumatera Utara, 2024)In the field of healthcare analytics, the importance of data quality and completeness cannot be overstated. The recurring nature of pandemics also serves as a motivation for this study, which focuses on preprocessing ... -
Kombinasi Metode 2DPCA (Two-Dimensional Principal Component Analysis), sPCA (sparse Principal Component Analysis), dan Ridge Regression Model dalam Pengenalan Wajah
(Universitas Sumatera Utara, 2024)The 2DPCA (Two-Dimensional Principal Component Analysis) method, an extension of the PCA (Principal Component Analysis) method, is commonly used in pattern recognition to represent complex data in lower dimensions. One ... -
Pengembangan Model Deep Learning Menggunakan Fine-Tuning ResNet-18 untuk Diagnosis Leukemia Akut pada Blood Smear Images
(Universitas Sumatera Utara, 2024)This study presents an investigation of fine-tuning ResNet-18 model for the precise diagnosis of acute leukemia from blood smear images. Early detection of acute leukemia is crucial for improving patient prognosis. Despite ... -
Menentukan Parameter K pada K-Nearest Neighbors (KNN) Menggunakan Random Grid Search
(Universitas Sumatera Utara, 2024)This research aims to optimise the classification of trainee acceptance using the K-Nearest Neighbors (KNN) algorithm by finding the optimal value for the K parameter through a combination of Random Search and Grid ... -
Optimasi Kombinasi Parameter Cost dan Kernel SVM melalui Gridsearch
(Universitas Sumatera Utara, 2024)The aim of this research is to improve the performance of the Support Vector Machine (SVM) algorithm in determining the values of Cost and Kernel parameters using the GridSearch technique. This study focuses on sentiment ... -
Cryptography Random Algorythm (CRA) untuk Mengantisipasi Serangan dengan Brute Force
(Universitas Sumatera Utara, 2024)One type of algorithm that is often used to secure data is the asymmetric algorithm, where this algorithm is widely used by business entities and governments to secure data. We know that this algorithm relies on two keys ... -
Peningkatan Akurasi Support Vector Machine pada Klasifikasi Pengaduan Masyarakat Menggunakan Algoritma Firefly
(Universitas Sumatera Utara, 2024)Public complaint services need to receive responses promptly from the relevant department. Therefore, a text classification system with best accuracy is needed. One of the methods used is the Support Vector Machine (SVM). ... -
Unjuk Kerja Term Frequency – Inverse Document Frequency dan K-Means dalam Identifikasi Layanan Pemerintah
(Universitas Sumatera Utara, 2024)Term Frequency-Inverse Document Frequency (TF-IDF) is used to assess the importance of words in a document relative to the rest of the document set, while K-Means clusters documents based on content similarity. Utilizing ... -
Teknik Peningkatan Performa Algoritma RSA dalam Pengamanan Data Dokumen
(Universitas Sumatera Utara, 2024)Advances in information system technology have allowed for the extensive exchange of data between users without spatial and temporal restrictions, but they also carry security risks related to information confidentiality. ... -
Klasifikasi Sentimen Menggunakan Algoritma K-NN Berdasarkan Pendekatan Random Search Cross Validation
(Universitas Sumatera Utara, 2024)This research discusses sentiment classification using the K-Nearest Neighbor (K-NN) algorithm with the RANDOM SEARCH CROSS VALIDATION (RSCV) approach. This method aims to classify ChatGPT app user reviews into three ... -
Pengenalan Area Berbasiskan Struktur GRID: Studi Kasus pada Tanaman Padi Sawah dengan Wireless Sensor Network
(Universitas Sumatera Utara, 2024)In the modern era of agriculture, efficient and effective monitoring of agricultural land, particularly the meadow, is critical to enhancing production and crop quality. The objective of the research is to create a grid-based ... -
Pemilahan Limbah Padat Berbahaya dan Beracun (B3) Menggunakan Teknik Pembelajaran Ensemble dengan Arsitektur VGG-16 dan Densenet – 121
(Universitas Sumatera Utara, 2024)Waste has become one of the increasingly concerning environmental issues, escalating alongside population growth and human activities. According to data obtained from the Integrated Environmental and Forestry Information ... -
Studi Perbandingan Algoritma LUC dan Algoritmavincent-Sathiyamoorthy RSA dalam Pengamanan Data Digital
(Universitas Sumatera Utara, 2024)In contemporary digital cryptography, the public key method is known. In public key cryptography, encryption and decryption keys are required. The public key algorithms used to secure messages are the LUC algorithm and ... -
Cryptanalysis Algoritma Kunci Publik Inam-Kanwalzahid-Abid dengan Metode Brute-Force Attack
(Universitas Sumatera Utara, 2024)The Inam-Kanwal-Zahid-Abid public key cryptography system was developed based on polynomials using key length. This research tested brute-force attacks using short key lengths. The method employed in the study aimed to ... -
Audio Watermarking dengan Menggunakan Metode Random Steganography Algorithm
(Universitas Sumatera Utara, 2024)Audio watermarking is crucial due to its vulnerability to copyright infringement, where unauthorized use and theft can harm the rights of the owner. A Random Steganography Algorithm is proposed to safeguard music ownership ... -
Hybrid Cryptosystem dengan Algoritma Enhanced RSA dan Rivest Cipher 4 Based on Chaotic Map
(Universitas Sumatera Utara, 2023)In this study, we conducted experiments using the Hybrid Cryptosystem by combining the Rivest Cipher 4 Based On Chaotic Map algorithm or RCCM, which is a variant of the RC 4 Algorithm, with the Enhanced RSA, an improved ...