Master Theses
Master Theses
Recently added
Now showing items 101-120 of 621
-
Pengembangan Metode Zoning untuk Pengenalan Pola Menggunakan Transformasi Slant
(Universitas Sumatera Utara, 2017)In pattern recognition, feature extraction with zoning method is considered as one of the most effective methods for extracting characteristic of the pattern. However, the handwriting pattern recognition need another ... -
Analisis Fungsi Aktivasi Sigmoid Biner dan Sigmoid Bipolar dalam Algoritma Backpropagation pada Prediksi Kemampuan Siswa
(Universitas Sumatera Utara, 2013)The backpropagation method is method which is very good to solve introduction complex designs of problem. In the backpropagation, network every unit in the hidden layer. The same thing is also hold to hidden layer. Every ... -
Prediksi Prestasi Mahasiswa Berdasarkan Nilai Ujian Nasional Menggunakan Jaringan Saraf Tiruan dengan Metode TrainBP dan TrainBPX
(Universitas Sumatera Utara, 2012)Prediction of student achievement in this research only predict based on national test scores by using the trainbp method and the trainbpx method. This research uses the input patterns of the subjects tested on the national ... -
Metode Hybrid Particle Swarm Optimization - Jaringan Saraf Tiruan Untuk Peningkatan Akurasi Prediksi Hasil Pertandingan Sepakbola
(Universitas Sumatera Utara, 2016)Hybrid is using two methods to a problem with the aim to improve their approach towards the specified target data. Hybrid PSO-ANN one optimal algorithm to solve such predictions in football matches. The process begins with ... -
Pengenalan Image Daun Menggunakan Algoritma Back Propagation dengan Fungsi Aktivasi Sigmoid Bipolar dan Tangen Hiperbolik
(Universitas Sumatera Utara, 2014)Backpropagation method (back propagation) is an excellent method that used to deal with issues such as recognition of complex patterns. This method is very popular among of the other artificial neural network. Propagation ... -
Optical Character Recognition (OCR) dengan Menggunakan Neural Network dan Feature Extraction
(Universitas Sumatera Utara, 2013)Optical character recognition (OCR) is used to translate the character (character images) into a text format. This approach has many criteria for the introduction of the character image pattern detection, one approach taken ... -
Kualitas Layanan pada Jaringan Multi-Protocol Label Switching (MPLS) dengan Metode Hierarchical Token Bucket
(Universitas Sumatera Utara, 2013)Multi-Protocol Label Switching (MPLS) technology is a new data communication technology that changes the routing process to switching process using label. In this research, simulation measurement of Quality of Service (QoS) ... -
Analisis Keamanan Pesan dengan Metode Enhanced LSB Formasi 3-3-2 dan Metode AES-256
(Universitas Sumatera Utara, 2017)Security and confidentiality of data is an important issue in the era of sophistication of information technology. To ensure the security and confidentiality of the data we need a technique that confidential information ... -
Analisis Kinerja Protokol UDP-Lite dengan Kode Hamming Menggunakan Simulator NS-2
(Universitas Sumatera Utara, 2016)User Datagram Protocol (UDP) has a smaller delay characteristic of the Transmission Control Protocol (TCP) to transmit data packets because UDP does not use the confirmation packet (acknowledgment). This causes the UDP is ... -
Kombinasi Algoritma Kriptografi Advanced Encryption Standart dengan Algoritma Blowfish dalam Pengamanan Pesan E-Mail
(Universitas Sumatera Utara, 2015)Data security in files online delivery becomes very important in the world of information itself. One way that can be done for the security of data is to encrypt the data before it is sent. Cryptographic AES (Advanced ... -
Kombinasi Algoritma Triple DES dan Algoritma AES dalam Pengamanan File
(Universitas Sumatera Utara, 2014)Cryptography is a method to secure data sent from sender to recipient. Triple DES and AES are two symmetric algorithms commonly used in Automatic Teller Machine security and Blackberry Messenger. Since both of these are ... -
Analisa Algoritma Kriptografi LUC & Rabin dalam Mengamankan Pesan
(Universitas Sumatera Utara, 2014)With the development of computer technology, is now a multi-user application on the performance of a computer, the data can be shared with other users on the computer or in a wider network. But in addition to the data ... -
Pengaruh Perangkat Server Terhadap Kualitas Pengontrolan Jarak Jauh Melalui Internet
(Universitas Sumatera Utara, 2014)Internet greatly assist people in improving their quality of life. Almost all areas of human life can be accessed using the internet. Human aided by the internet that provides all sorts of information that they need. Along ... -
Kombinasi Hill Cipher, Vignere dan RSA dalam Hybrid Cryptosystem
(Universitas Sumatera Utara, 2014)Selection of symmetric cryptographic algorithms are designed so that the encryption decryption process requires a short time but are less secure security key and lock must be changed frequently. While on the contrary ... -
Kombinasi Algoritma Kriptografi RSA, Algoritma Fermat dan Algoritma Kompresi Huffman pada Pesan Teks
(Universitas Sumatera Utara, 2012)One of the aspects that must be considered in the process of sending messages is the security aspect, the message sender wants the message can be kept confidential from parties who are not interested, not a security issue ... -
Analisis Aryabhata Remainder Theorem dalam Kriptografi Rivest Shamir Adleman (RSA)
(Universitas Sumatera Utara, 2012)Rivest Shamir Adleman (RSA) is the most widely used crypto systems in security applications. Cryptographic security of RSA lies in the difficulty of factoring numbers p and q to be prime factors. The larger the value of p ... -
Pengamanan Pesan Teks dengan Algoritma Elgamal dan Algoritma Pembangkit Bilangan Prima The Sieve of Eratosthenes
(Universitas Sumatera Utara, 2012)Security issues are an important aspect in the delivery of data and information. Common communication medium that can be used by anyone making it very vulnerable to interception of information by parties who are not entitled ... -
Analisis Discrete Sine Transform (DST) dan Discrete Cosine Transform (DCT) pada Suara Sandi Morse
(Universitas Sumatera Utara, 2017)Voice recognition is a process to recognize the characteristics of a person's voice to recognize the speech of the person. The beginning stage a make a speech recognation system required sampling process. Interest voice ... -
AnalisisKinerja Algoritma C 4.5 dengan Pruning Menggunakan Decision Tree
(Universitas Sumatera Utara, 2016)Classification is a method that works to find a model that distinguishes data classes, so classification can predict the class label of an object that is not yet known. One method often used is the classification algorithm ... -
Teknik Kernel K-Means Clustering dan Support Vector Machine pada Sistem Evaluasi Akademik Mahasiswa
(Universitas Sumatera Utara, 2012)The evaluation of the progress of students' academic achievement at a college in general is still performed manually based on CGP A with a view of the Student Study Result Card each semester. Further the evaluation of ...