Department of Information Technology: Recent submissions
Now showing items 701-720 of 1422
-
Penggunaan Fuzzy Query Database untuk Pengembangan Model Evaluasi Umpan Balik terhadap Kinerja Dosen
(Universitas Sumatera Utara, 2011)This thesis suggests a feedback-evaluation model to determine the performance of lecturers. The more dominant factors that influence the performance of lecturers have not been determined. Data was obtained from ... -
Analisis Seleksi Atribut pada Algoritma Naïve Bayes Dalam Memprediksi Penyakit Jantung
(Universitas Sumatera Utara, 2013)Data mining can be used to predict a disease from patient’s medical records. Some of the attribute from the data may have a value that is not relevant to the task of data mining and if included it can interfere and causing ... -
Analisis Mapping pada Partially Mapped Crossover Dalam Algoritma Genetika pada Travelling Salesman Problem
(Universitas Sumatera Utara, 2014)Traveling salesman problem is the problem how salesman can set tour to visit a number of cities which known distance of the city with other cities so that the distance is the minimum distance where the salesman can only ... -
Model Pemilihan Dengan Menggunakan Metode Profile Matching dan AHP
(Universitas Sumatera Utara, 2013)This research is used to solve problems in determining ranking in the election. In the manufacture of this model is the use of a questionnaire given to teachers - teachers in Methodist schools -1 field. Therefore, the ... -
Kombinasi Metode Fuzzy Tsukamoto dan Metode Antropometri Untuk Medapatkan Status Gizi Seimbang
(Universitas Sumatera Utara, 2014)The toddler years are a time when a toddler requires a balanced nutrition and can fill up the nutritional needs of infants and if the toddler suffered malnutrition will be vulnerable to their future growth and also mentally. ... -
Replikasi pada Standby Database Menggunakan Metode Incremental Backup
(Universitas Sumatera Utara, 2014)For some government agencies or companies, the data is one of the assets that must be guaranteed its existence. However, the risk of data loss caused by maintenance, database damage, damage to the media, corruption of ... -
Optimasi Kinerja Algoritma K-Nearest Neighbor Menggunakan Seleksi Fitur Gain Ratio dan Local Mean Vector
(Universitas Sumatera Utara, 2021)K-Nearest Neighbor (K-NN) is an algorithm that many used in the data classification method. But based on the results of some research, it shows that the performance of K-NN is still lower than other classification methods. ... -
Analisis Kinerja Algoritma Genetika pada Persoalan NP-Complete
(Universitas Sumatera Utara, 2021)NP-Complete problem is one of the difficult problems in algorithmic strategy, but also interesting. The Non-Deterministic Polynomial Complete Problem is interesting and difficult because until now there are so many studies ... -
Kinerja Gabungan Algoritma Hill Cipher dan Algoritma Caesar Cipher dalam Pengamanan Teks
(Universitas Sumatera Utara, 2021)In a data security, a technique is needed to secure data from experiments and attacks carried out by cryptanalysts. The technique of securing data is also known as cryptography. In this research, data security has been ... -
Penerapan Teknik Data Mining dengan Metode Smooth Support Vector Machine (SSVM) untuk Memprediksi Mahasiswa yang Berpeluang Drop Out (Studi Kasus Mahasiswa Politeknik Negeri Medan)
(Universitas Sumatera Utara, 2011)Support Vector Machines (SVM) is a new algorithm of data mining techniques, the increasing popularity in machine learning and statistics communities. SVM has been introduced by Vapnik to solve the problem of pattern ... -
Analisis Perbandingan Backpropagation dengan Learning Vector Quantization (LVQ) untuk Memprediksi Curah Hujan di Kota Medan
(Universitas Sumatera Utara, 2014)Precipitation is a very important factor in agriculture and development planning. This study aims to predict precipitation and characteristic of rainfall in Medan using neural network with Backpropagation algorithm and ... -
Analisis Pengamanan Jaringan pada Protokol IPV6 Menggunakan Multi-Layer Ipsec
(Universitas Sumatera Utara, 2016)Security is an important aspect of computer network operations. In support of computer network security, various security methods had been developed, both application level security such as Pretty Good Privacy (PGP), ... -
Analisis Performance Atas Metode Arithmetic Crossover dalam Algoritma Genetika
(Universitas Sumatera Utara, 2015)Genetic algorithms are often used in practical problems that focuses on search parameters or the optimal solution. Excess genetic algorithm is its ability to obtain global optima in the search for a solution that is often ... -
Kombinasi Algoritma AES, RC4 dan Elgamal dalam Skema Kriptografi Hybrid untuk Keamanan Data
(Universitas Sumatera Utara, 2016)Delivery or exchange of data is something that often happens in the world of information technology. Data sent sometimes often contain important information data even highly confidential and must be safeguarded. To maintain ... -
Pengembangan Algoritma Block Chiper RC6 Pada Citra Digital
(Universitas Sumatera Utara, 2013)RC6 is a block cipher method that uses a register block to block four of each size for 32bit. In other words, each block will keep the four characters. In the digital image of each pixel consists of three components, namely ... -
Analisis Metode Ahp (Analytical Hierarchy Process) Berdasarkan Nilai Consistency Ratio
(Universitas Sumatera Utara, 2014)AHP (Analytical Hierarchy Process) is a decision support system developed by comparing the degree of interest among criteria. The drawback of this method is the assessment will be inconsistent if the decision maker makes ... -
Penggunaan Metode Support Vector Machine (SVM) untuk Mengklasifikasi dan Memprediksi Angkutan Udara Jenis Penerbangan Domestik dan Penerbangan Internasional di Banda Aceh
(Universitas Sumatera Utara, 2011)This Paper present the analysis of the performance implementing of support vector machine with 11 independent variable and 1 dependent variable. The SVM method with training data (75%) and testing data (25%) able used ... -
Analisis Kinerja Algoritma Genetika pada Persoalan NP-Complete
(Universitas Sumatera Utara, 2021)NP-Complete problem is one of the difficult problems in algorithmic strategy, but also interesting. The Non-Deterministic Polynomial Complete Problem is interesting and difficult because until now there are so many studies ... -
Steganografi Teks Menggunakan Pangram dan Medium Citra pada Enhanced Least Significant Bit
(Universitas Sumatera Utara, 2014)Insertion method LSB (Least Significant Bit) is a simple steganographic algorithm that takes the least significant bit as much as a few bits of media cover (the cover medium) and replacing it with a bit stream that contains ... -
Analisis Model Segitiga (Trimf) pada Fungsi Keanggotaan Fuzzy Logic dengan Metode Mamdani
(Universitas Sumatera Utara, 2021)The membership functions is a pause of 0 and 1 in the chart that has a membership value in the output. In the fuzzy rules of the set, the membership is of value to beerratic in the elements in the determinant of the existence ...