Department of Information Technology: Recent submissions
Now showing items 401-420 of 1414
-
Metode Hybrid Particle Swarm Optimization - Jaringan Saraf Tiruan Untuk Peningkatan Akurasi Prediksi Hasil Pertandingan Sepakbola
(Universitas Sumatera Utara, 2016)Hybrid is using two methods to a problem with the aim to improve their approach towards the specified target data. Hybrid PSO-ANN one optimal algorithm to solve such predictions in football matches. The process begins with ... -
Pengenalan Image Daun Menggunakan Algoritma Back Propagation dengan Fungsi Aktivasi Sigmoid Bipolar dan Tangen Hiperbolik
(Universitas Sumatera Utara, 2014)Backpropagation method (back propagation) is an excellent method that used to deal with issues such as recognition of complex patterns. This method is very popular among of the other artificial neural network. Propagation ... -
Optical Character Recognition (OCR) dengan Menggunakan Neural Network dan Feature Extraction
(Universitas Sumatera Utara, 2013)Optical character recognition (OCR) is used to translate the character (character images) into a text format. This approach has many criteria for the introduction of the character image pattern detection, one approach taken ... -
Kualitas Layanan pada Jaringan Multi-Protocol Label Switching (MPLS) dengan Metode Hierarchical Token Bucket
(Universitas Sumatera Utara, 2013)Multi-Protocol Label Switching (MPLS) technology is a new data communication technology that changes the routing process to switching process using label. In this research, simulation measurement of Quality of Service (QoS) ... -
Analisis Keamanan Pesan dengan Metode Enhanced LSB Formasi 3-3-2 dan Metode AES-256
(Universitas Sumatera Utara, 2017)Security and confidentiality of data is an important issue in the era of sophistication of information technology. To ensure the security and confidentiality of the data we need a technique that confidential information ... -
Analisis Kinerja Protokol UDP-Lite dengan Kode Hamming Menggunakan Simulator NS-2
(Universitas Sumatera Utara, 2016)User Datagram Protocol (UDP) has a smaller delay characteristic of the Transmission Control Protocol (TCP) to transmit data packets because UDP does not use the confirmation packet (acknowledgment). This causes the UDP is ... -
Kombinasi Algoritma Kriptografi Advanced Encryption Standart dengan Algoritma Blowfish dalam Pengamanan Pesan E-Mail
(Universitas Sumatera Utara, 2015)Data security in files online delivery becomes very important in the world of information itself. One way that can be done for the security of data is to encrypt the data before it is sent. Cryptographic AES (Advanced ... -
Kombinasi Algoritma Triple DES dan Algoritma AES dalam Pengamanan File
(Universitas Sumatera Utara, 2014)Cryptography is a method to secure data sent from sender to recipient. Triple DES and AES are two symmetric algorithms commonly used in Automatic Teller Machine security and Blackberry Messenger. Since both of these are ... -
Analisa Algoritma Kriptografi LUC & Rabin dalam Mengamankan Pesan
(Universitas Sumatera Utara, 2014)With the development of computer technology, is now a multi-user application on the performance of a computer, the data can be shared with other users on the computer or in a wider network. But in addition to the data ... -
Pengaruh Perangkat Server Terhadap Kualitas Pengontrolan Jarak Jauh Melalui Internet
(Universitas Sumatera Utara, 2014)Internet greatly assist people in improving their quality of life. Almost all areas of human life can be accessed using the internet. Human aided by the internet that provides all sorts of information that they need. Along ... -
Kombinasi Hill Cipher, Vignere dan RSA dalam Hybrid Cryptosystem
(Universitas Sumatera Utara, 2014)Selection of symmetric cryptographic algorithms are designed so that the encryption decryption process requires a short time but are less secure security key and lock must be changed frequently. While on the contrary ... -
Kombinasi Algoritma Kriptografi RSA, Algoritma Fermat dan Algoritma Kompresi Huffman pada Pesan Teks
(Universitas Sumatera Utara, 2012)One of the aspects that must be considered in the process of sending messages is the security aspect, the message sender wants the message can be kept confidential from parties who are not interested, not a security issue ... -
Analisis Sentimen pada Twitter Menggunakan Text Mining
(Universitas Sumatera Utara, 2014)Twitter salah satu situs microblogging memungkinkan penggunanya untuk menulis tentang berbagai topik dan membahas isu-isu yang tejadi pada saat ini. Banyak pengguna yang melakukan posting pendapat mereka akan sebuah ... -
Analisis Aryabhata Remainder Theorem dalam Kriptografi Rivest Shamir Adleman (RSA)
(Universitas Sumatera Utara, 2012)Rivest Shamir Adleman (RSA) is the most widely used crypto systems in security applications. Cryptographic security of RSA lies in the difficulty of factoring numbers p and q to be prime factors. The larger the value of p ... -
Pengamanan Pesan Teks dengan Algoritma Elgamal dan Algoritma Pembangkit Bilangan Prima The Sieve of Eratosthenes
(Universitas Sumatera Utara, 2012)Security issues are an important aspect in the delivery of data and information. Common communication medium that can be used by anyone making it very vulnerable to interception of information by parties who are not entitled ... -
Klasifikasi Tingkat Keparahan Diabetic Maculopaty Melalui Citra Retina Menggunakan Deep Residual Network (Resnet)
(Universitas Sumatera Utara, 2022)Diabetic maculopathy (DM) is a microvascular complication that causes damage to the blood vessels in the center of the retina (macula) resulting in the build-up of fluid that causes impaired central vision. This disease ... -
Identifikasi Hypertensive Retinopathy pada Citra Fundus Retina Menggunakan Deep Belief Network (DBN)
(Universitas Sumatera Utara, 2022)Hypertension causes disease complications that can lead to death. Hypertensive retinopathy causes damage to the retina or blood circulation around the retina due to high blood pressure which can lead to blindness. Hypertensive ... -
Kombinasi Metode Tomek-Links dan Random Undersampling untuk Identifikasi Single Nucleotide Polymorphism Menggunakan Artificial Neural Network pada Genom Kedelai
(Universitas Sumatera Utara, 2022)Next Generation Sequencing (NGS) is a machine that can read Single Nucleotide Polymorphism on a genome, including the soybean genome used in this study. However, the machine has a high error rate so that more SNP candidate ... -
Perancangan Secure Login Website menggunakan Algoritma Enkripsi Xxtea
(Universitas Sumatera Utara, 2012)WEB SECURE LOGIN DESIGN USING CORRECTED BLOCK TINY ENCRYPTION ALGORITHM ABSTRACT The basic format of the login form sends the contents of user-id and password from the client to the server in plaintext format. The ... -
Metode Hybrid (Content Dan Collaborative Based) Nearest Neighbour untuk Sistem Rekomendasi Pariwisata
(Universitas Sumatera Utara, 2011)A recommendation system is an application to provide and recommend item to make desired decision by the user. Hybrid method (content-based and collaborative) nearest neighbor is proposed to solve content and collaborative ...