Master Theses
Master Theses
Recently added
Now showing items 101-120 of 627
-
Kombinasi Multilayer Fuzzy Inference System (MFIS) dengan K-Means pada Sistem Klasifikasi Penyakit Gigi
(Universitas Sumatera Utara, 2022)Screening is an important procedure that must be passed in every task before determining the action to be taken by all health workers. In the field of dental and oral health, a patient is often found who cannot represent ... -
Analisis Variasi Jumlah Fitur MFCC pada LSTM dalam Klasifikasi Suara Aksen Berbahasa Inggris
(Universitas Sumatera Utara, 2022)Numerous research have been performed to classify English accents using both classic and contemporary classification methods. In general, past research on voice classification and voice recognition employs the MFCC approach ... -
Peningkatan Keamanan Jaringan Komputer Menggunakan DHCP Snooping dan Switch Port Security
(Universitas Sumatera Utara, 2022)In the development of computer networks, there are many problems with computer network security such as data confidentiality, integrity, reliability and availability. Attacks in computer networks are increasing from year ... -
Model Layanan Instalasi Jaringan Menggunakan Metode Zero Touch Provisioning dengan Metode Priority dan Round-Robin
(Universitas Sumatera Utara, 2023)Utilization of software-based automation technology based on the internet network distribution process is currently still relatively expensive, while the conventional way of the configuration process will result in ... -
Three Pass Protocol untuk Keamanan Kunci Menggunakan Algoritma Affine Cipher dan Kombinasi Exclusive-Or (XOR)
(Universitas Sumatera Utara, 2023)Information is a very important concern in the current technological era, especially in terms of security through the exchange of information that is so fast that it makes it easy for people to get various kinds of information ... -
Model Tingkat Kepuasan Mahasiswa Terhadap Kinerja Berdasarkan Fuzzy Tahani
(Universitas Sumatera Utara, 2013)Lecturers ' performance is considered good if they conduct lectures according to lecturing qualified standard in which the lecturers have GBPP (Teaching Guidance Broad Outline), SAP (Teaching Reference Unit), Syllabus, ... -
Pengembangan Metode Zoning untuk Pengenalan Pola Menggunakan Transformasi Slant
(Universitas Sumatera Utara, 2017)In pattern recognition, feature extraction with zoning method is considered as one of the most effective methods for extracting characteristic of the pattern. However, the handwriting pattern recognition need another ... -
Analisis Fungsi Aktivasi Sigmoid Biner dan Sigmoid Bipolar dalam Algoritma Backpropagation pada Prediksi Kemampuan Siswa
(Universitas Sumatera Utara, 2013)The backpropagation method is method which is very good to solve introduction complex designs of problem. In the backpropagation, network every unit in the hidden layer. The same thing is also hold to hidden layer. Every ... -
Prediksi Prestasi Mahasiswa Berdasarkan Nilai Ujian Nasional Menggunakan Jaringan Saraf Tiruan dengan Metode TrainBP dan TrainBPX
(Universitas Sumatera Utara, 2012)Prediction of student achievement in this research only predict based on national test scores by using the trainbp method and the trainbpx method. This research uses the input patterns of the subjects tested on the national ... -
Metode Hybrid Particle Swarm Optimization - Jaringan Saraf Tiruan Untuk Peningkatan Akurasi Prediksi Hasil Pertandingan Sepakbola
(Universitas Sumatera Utara, 2016)Hybrid is using two methods to a problem with the aim to improve their approach towards the specified target data. Hybrid PSO-ANN one optimal algorithm to solve such predictions in football matches. The process begins with ... -
Pengenalan Image Daun Menggunakan Algoritma Back Propagation dengan Fungsi Aktivasi Sigmoid Bipolar dan Tangen Hiperbolik
(Universitas Sumatera Utara, 2014)Backpropagation method (back propagation) is an excellent method that used to deal with issues such as recognition of complex patterns. This method is very popular among of the other artificial neural network. Propagation ... -
Optical Character Recognition (OCR) dengan Menggunakan Neural Network dan Feature Extraction
(Universitas Sumatera Utara, 2013)Optical character recognition (OCR) is used to translate the character (character images) into a text format. This approach has many criteria for the introduction of the character image pattern detection, one approach taken ... -
Kualitas Layanan pada Jaringan Multi-Protocol Label Switching (MPLS) dengan Metode Hierarchical Token Bucket
(Universitas Sumatera Utara, 2013)Multi-Protocol Label Switching (MPLS) technology is a new data communication technology that changes the routing process to switching process using label. In this research, simulation measurement of Quality of Service (QoS) ... -
Analisis Keamanan Pesan dengan Metode Enhanced LSB Formasi 3-3-2 dan Metode AES-256
(Universitas Sumatera Utara, 2017)Security and confidentiality of data is an important issue in the era of sophistication of information technology. To ensure the security and confidentiality of the data we need a technique that confidential information ... -
Analisis Kinerja Protokol UDP-Lite dengan Kode Hamming Menggunakan Simulator NS-2
(Universitas Sumatera Utara, 2016)User Datagram Protocol (UDP) has a smaller delay characteristic of the Transmission Control Protocol (TCP) to transmit data packets because UDP does not use the confirmation packet (acknowledgment). This causes the UDP is ... -
Kombinasi Algoritma Kriptografi Advanced Encryption Standart dengan Algoritma Blowfish dalam Pengamanan Pesan E-Mail
(Universitas Sumatera Utara, 2015)Data security in files online delivery becomes very important in the world of information itself. One way that can be done for the security of data is to encrypt the data before it is sent. Cryptographic AES (Advanced ... -
Kombinasi Algoritma Triple DES dan Algoritma AES dalam Pengamanan File
(Universitas Sumatera Utara, 2014)Cryptography is a method to secure data sent from sender to recipient. Triple DES and AES are two symmetric algorithms commonly used in Automatic Teller Machine security and Blackberry Messenger. Since both of these are ... -
Analisa Algoritma Kriptografi LUC & Rabin dalam Mengamankan Pesan
(Universitas Sumatera Utara, 2014)With the development of computer technology, is now a multi-user application on the performance of a computer, the data can be shared with other users on the computer or in a wider network. But in addition to the data ... -
Pengaruh Perangkat Server Terhadap Kualitas Pengontrolan Jarak Jauh Melalui Internet
(Universitas Sumatera Utara, 2014)Internet greatly assist people in improving their quality of life. Almost all areas of human life can be accessed using the internet. Human aided by the internet that provides all sorts of information that they need. Along ... -
Kombinasi Hill Cipher, Vignere dan RSA dalam Hybrid Cryptosystem
(Universitas Sumatera Utara, 2014)Selection of symmetric cryptographic algorithms are designed so that the encryption decryption process requires a short time but are less secure security key and lock must be changed frequently. While on the contrary ...
