Department of Information Technology: Recent submissions
Now showing items 61-80 of 1388
-
Klasifikasi Citra Motif Batik di Indonesia Menggunakan Ekstraksi Ciri Completed Local Binary Pattern dan Template Matching
(Universitas Sumatera Utara, 2024)Batik has become an identity of Indonesian culture in the era of globalization since UNESCO designated it as an intangible cultural heritage for humanity on October 2, 2009. Indonesian batik has become a highly valued ... -
Analisis Sentimen terhadap Aplikasi Sirekap Mobile Berbasis Aspek pada Pemilihan Umum 2024 dengan Metode Naive Bayes
(Universitas Sumatera Utara, 2024)Sirekap Mobile is an application used for vote tallying at Polling Stations (TPS) in the 2024 General Election, developed by the General Election Commission (KPU) to streamline the vote tallying process. However, its ... -
Perancangan Media Pembelajaran Network Board Tour untuk Mempelajari Alat Jaringan dengan Memanfaatkan Teknologi Augmented Reality Markerless
(Universitas Sumatera Utara, 2024)Augmented Reality (AR) merupakan sebuah teknologi yang memiliki kemampuan untuk menggabungkan dunia nyata dan dunia maya, berbentuk objek 3D yang bersifat interaktif secara real time. Sejauh ini, Marker (penanda) hitam ... -
Deteksi Garis Lapangan Sepakbola Robot dengan Metode Hough Transform dan SSD MobileneT V2
(Universitas Sumatera Utara, 2024)When playing a wheeled soccer robot match properly, a robot must at least have some basic skills such as following the movement of the ball, dribbling, and kicking the ball towards the opponent's goal. To achieve this, the ... -
Chatbot Informasi Cryptocurrency dan Forecast Cryptocurrency Menggunakan RNN-LSTM
(Universitas Sumatera Utara, 2024)Cryptocurrencies have garnered significant attention in the financial market, with rapidly changing and unpredictable price fluctuations. To assist cryptocurrency investors in making informed decisions or obtaining ... -
Algoritma Hibrid Menggunakan CNN dan LSTM untuk Peningkatan Performansi pada Klasifikasi Citra Lesi Kulit
(Universitas Sumatera Utara, 2024)Skin lesions areacondition of abnormal growths or changes in theappearanceofthe skin, such as lumps, abrasions, cysts, or colordifferences. Skin lesionscan bedetected as cancerous and non-cancerous. Detecting earlier skin ... -
Kombinasi Metode 2DPCA (Two-Dimensional Principal Component Analysis), sPCA (sparse Principal Component Analysis), dan Ridge Regression Model dalam Pengenalan Wajah
(Universitas Sumatera Utara, 2024)The 2DPCA (Two-Dimensional Principal Component Analysis) method, an extension of the PCA (Principal Component Analysis) method, is commonly used in pattern recognition to represent complex data in lower dimensions. One ... -
Pengembangan Model Deep Learning Menggunakan Fine-Tuning ResNet-18 untuk Diagnosis Leukemia Akut pada Blood Smear Images
(Universitas Sumatera Utara, 2024)This study presents an investigation of fine-tuning ResNet-18 model for the precise diagnosis of acute leukemia from blood smear images. Early detection of acute leukemia is crucial for improving patient prognosis. Despite ... -
Menentukan Parameter K pada K-Nearest Neighbors (KNN) Menggunakan Random Grid Search
(Universitas Sumatera Utara, 2024)This research aims to optimise the classification of trainee acceptance using the K-Nearest Neighbors (KNN) algorithm by finding the optimal value for the K parameter through a combination of Random Search and Grid ... -
Optimasi Kombinasi Parameter Cost dan Kernel SVM melalui Gridsearch
(Universitas Sumatera Utara, 2024)The aim of this research is to improve the performance of the Support Vector Machine (SVM) algorithm in determining the values of Cost and Kernel parameters using the GridSearch technique. This study focuses on sentiment ... -
Cryptography Random Algorythm (CRA) untuk Mengantisipasi Serangan dengan Brute Force
(Universitas Sumatera Utara, 2024)One type of algorithm that is often used to secure data is the asymmetric algorithm, where this algorithm is widely used by business entities and governments to secure data. We know that this algorithm relies on two keys ... -
Peningkatan Akurasi Support Vector Machine pada Klasifikasi Pengaduan Masyarakat Menggunakan Algoritma Firefly
(Universitas Sumatera Utara, 2024)Public complaint services need to receive responses promptly from the relevant department. Therefore, a text classification system with best accuracy is needed. One of the methods used is the Support Vector Machine (SVM). ... -
Unjuk Kerja Term Frequency – Inverse Document Frequency dan K-Means dalam Identifikasi Layanan Pemerintah
(Universitas Sumatera Utara, 2024)Term Frequency-Inverse Document Frequency (TF-IDF) is used to assess the importance of words in a document relative to the rest of the document set, while K-Means clusters documents based on content similarity. Utilizing ... -
Teknik Peningkatan Performa Algoritma RSA dalam Pengamanan Data Dokumen
(Universitas Sumatera Utara, 2024)Advances in information system technology have allowed for the extensive exchange of data between users without spatial and temporal restrictions, but they also carry security risks related to information confidentiality. ... -
Klasifikasi Sentimen Menggunakan Algoritma K-NN Berdasarkan Pendekatan Random Search Cross Validation
(Universitas Sumatera Utara, 2024)This research discusses sentiment classification using the K-Nearest Neighbor (K-NN) algorithm with the RANDOM SEARCH CROSS VALIDATION (RSCV) approach. This method aims to classify ChatGPT app user reviews into three ... -
Pengenalan Area Berbasiskan Struktur GRID: Studi Kasus pada Tanaman Padi Sawah dengan Wireless Sensor Network
(Universitas Sumatera Utara, 2024)In the modern era of agriculture, efficient and effective monitoring of agricultural land, particularly the meadow, is critical to enhancing production and crop quality. The objective of the research is to create a grid-based ... -
Pemilahan Limbah Padat Berbahaya dan Beracun (B3) Menggunakan Teknik Pembelajaran Ensemble dengan Arsitektur VGG-16 dan Densenet – 121
(Universitas Sumatera Utara, 2024)Waste has become one of the increasingly concerning environmental issues, escalating alongside population growth and human activities. According to data obtained from the Integrated Environmental and Forestry Information ... -
Studi Perbandingan Algoritma LUC dan Algoritmavincent-Sathiyamoorthy RSA dalam Pengamanan Data Digital
(Universitas Sumatera Utara, 2024)In contemporary digital cryptography, the public key method is known. In public key cryptography, encryption and decryption keys are required. The public key algorithms used to secure messages are the LUC algorithm and ... -
Audio Watermarking dengan Menggunakan Metode Random Steganography Algorithm
(Universitas Sumatera Utara, 2024)Audio watermarking is crucial due to its vulnerability to copyright infringement, where unauthorized use and theft can harm the rights of the owner. A Random Steganography Algorithm is proposed to safeguard music ownership ... -
Hybrid Cryptosystem dengan Algoritma Enhanced RSA dan Rivest Cipher 4 Based on Chaotic Map
(Universitas Sumatera Utara, 2023)In this study, we conducted experiments using the Hybrid Cryptosystem by combining the Rivest Cipher 4 Based On Chaotic Map algorithm or RCCM, which is a variant of the RC 4 Algorithm, with the Enhanced RSA, an improved ...