Master Theses
Master Theses
Recently added
Now showing items 301-320 of 627
-
Optimasi Jadwal Perkuliahan Dosen dengan Neighborhood Search Methods
(Universitas Sumatera Utara, 2015)Scheduling activities in a college lecture / campus is a complex and often experience difficulties, which led to the allocation of courses with professors and room often clashed with the schedule of courses, lecturers ... -
Analisis Penerapan Model Inferensi Fuzzy Tsukamoto dalam Penilaian Pencapaian Kompetensi Program Studi
(Universitas Sumatera Utara, 2015)This thesis proposes an evaluation model of study programs for students. The method is used by using Fuzzy Tsukamoto. Because Tsukamoto Method is very flexible and provides better performance and more consistent and ... -
Analisis Rule Fuzzy Inferensi Sugeno dalam Sistem Pendukung Keputusan
(Universitas Sumatera Utara, 2015)The issue of decision-making, is essentially a form of election of the various alternative actions that may have been that the process through specific mechanisms, with the hope of producing a best decision. Preparation ... -
Penghalusan Citra Lokal Adaptif pada B-Spline Hirarki
(Universitas Sumatera Utara, 2014)Digital image processing is an important part in the field of Information Technology, especially in the field of multimedia. Digital image is obtained through the process of enlargement of the image needs to be smoothed ... -
Analisis Metode Fuzzy Analytic Hierarchy Process (FAHP) dalam Menentukan Posisi Jabatan
(Universitas Sumatera Utara, 2013)This study aims to determine positions with many criteria . In determining positions often appear the probability of every possible improper, because of the many factors that influence the assessment of existing options ... -
Semantik Suksesi Sistem Informasi Berdasarkan Populasi Teks
(Universitas Sumatera Utara, 2014)The information system success relates to the measurement of user satisfaction and information system actuators. In other words, the existence of information systems are always related to organizations or groups of ... -
Pengembangan Algoritma RC6 dalam Proteksi Transmisi Data dengan Mengkombinasikan RC5 dan RC6
(Universitas Sumatera Utara, 2013)In this study the authors developed a secret-key block cipher called the new development proposed RC6 algorithm is an evolutionary improvement of 128 bit RC6 is designed to meet the requirements of the Advanced Encryption ... -
Pendekatan Axiomatic Design dalam Fuzzy Multi Criteria Decision Making
(Universitas Sumatera Utara, 2012)An approach is needed to represent the fuzzy condition in making an objective decision by considering some fuzzy alternatives and criteria. In this research, FMCDM and axiomatic design are used to measure how the ... -
Model Profil Mahasiswa yang Potensial Drop Out Menggunakan Teknik Kernel K-Mean Clustering dan Decision Tree
(Universitas Sumatera Utara, 2012)This thesis presents a model profile of potential students who drop out. The model was compiled using kernel k-means clustering and Decision Tree. This is motivated by the existence of unequal causes students who drop out ... -
Analisis Penentuan Prioritas Penunjukan Pejabat Struktural menggunakan Metode Analytic Hierarchy Process (Ahp) (Studi Kasus Yp. Shafiyyatul Amaliyyah Medan)
(Universitas Sumatera Utara, 2014)This research particularly aims to implement the AHP method (Analytic Hierarchy Process) in the concern of formulation and decision-making process, especially in terms of designation of structural officials priority ... -
Algoritma One Time Pad pada Skema Three Pass Protocol
(Universitas Sumatera Utara, 2014)In this study the authors use the One Time Pad Algorithm on Three Pass Protocol scheme. Algorithm One Time Pad is known as a perfect algorithm and very difficult to resolve, the encryption key is used only once for a ... -
Algoritma Kriptografi Modified Aes 128 Bit dan Compressed Elgamal
(Universitas Sumatera Utara, 2016)Cryptography is the science that studies the encryption technique where data is encrypted using a key that it becomes difficult to read if someone does not have a key for decryption. One commonly used cryptographic ... -
Analisis Kinerja Multithreading pada Resilient Backpropagation
(Universitas Sumatera Utara, 2016)The process of learning neural network very important aims in order for neural network can recognize the environment. The process of learning in neural networks takes time to recognize the environment depends on its great ... -
Analisis Kombinasi Algoritma Steganografi Lsb dan Visual Kriptografi terhadap Keamanan Data
(Universitas Sumatera Utara, 2016)Security is something that is desperately needed in the delivery of the data and in the communication between the two sides, there is no guarantee that states that the communication occurs has been safe from the threat ... -
Analisis Perbandingan Online dan Offline Training pada Jaringan Backpropagation pada Kasus Pengenalan Huruf Abjad
(Universitas Sumatera Utara, 2015)This study was made for the study of neural network models are Backpropagation, in which there are methods of teaching-learning useful for us to know the identification of the problem so that it can learn the model by ... -
Analisis Kombinasi Algoritma Watermarking Modified Least Significant Bit dengan Least Significant Bit +1
(Universitas Sumatera Utara, 2015)To protect someone's copyright on digital media such as digital image watermarking technique can be done, which is a technique to insert copyright marks into digital media. Algorithms commonly used in the watermark insertion ... -
Penentuan Tingkat Kinerja Karyawan dengan Menggunakan Metode Fuzzy Multi Criteria Decision Making
(Universitas Sumatera Utara, 2014)Companies often provide incentives to employees for the performance of the employee to the company is expected to increase. Therefore the criteria specified how these employees are given incentives so that the employees ... -
Pembangkit Fungsi Keanggotaan Fuzzy Otomatis Menggunakan Neural Network
(Universitas Sumatera Utara, 2012)In this study the author used an algorithm Backpropagation Neural Network (BPNN) to generate automatically fuzzy membership functions, in order to obtain a more precise membership functions according to the data ... -
Analisis Konfigurasi Multi Protocol Label Switching (MPLS) untuk Meningkatkan Kinerja Jaringan
(Universitas Sumatera Utara, 2011)Multi Protocol Label Switching (MPLS) is one method that can be used for tuning the network to further improve network performance. By using MPLS method weaknesses that exist in traditional IP networks will be opened ... -
Pengenalan Pola dalam Fuzzy Clustering dengan Pendekatan Algoritma Genetika
(Universitas Sumatera Utara, 2011)The classification of data by pattern in a cluster to determine the cluster center based on the equality level measured by distance function. By using genetic operator mechanism, i.e. crossing and population mutation ...
