Department of Information Technology: Recent submissions
Now showing items 721-740 of 1422
-
Performance of Combining Hill Cipher Algorithm and Caesar Cipher Algorithm in Text Security
(Universitas Sumatera Utara, 2021)In a data security, a technique is needed to secure data from experiments and attacks carried out by cryptanalysts. The technique of securing data is also known as cryptography. In this research, data security has been ... -
Analisis Pemilihan Partially Mapped Crossover Algoritma Genetika pada Penyelesaian Travelling Salesman Problem
(Universitas Sumatera Utara, 2011)Traveling Salesman Problem (TSP) is an optimization problem that can be applied to a variety of activities. Fundamental from problems of TSP is how the salesman can arrange travel routes so that the distance which he ... -
Peningkatan Kinerja Algoritma Learning Vector Quantization (LVQ) Menggunakan Nguyen Widrow
(Universitas Sumatera Utara, 2021)Learning Vector Quantization is a method of identifying with unit outputs and conducting supervised learning on the competitive layer. The competitive layer will learn automatically to recognize input vectors with very ... -
Pengembangan Model Fit Human Organization Technology (Hot) Menggunakan Regresi Linier dan Neural Network
(Universitas Sumatera Utara, 2015)This study aimed to evaluate the academic information system implementation using the development of the model HOT (Human Organization Technology) Fit. Development model applied is to use the model TUTO (Top-User ... -
Analisis Teknikoptimasiwebsite terhadap Hasil Pencariangoogle
(Universitas Sumatera Utara, 2015)Currently circulating on the internet website has many and will continue to grow, to make it easier to search websites on the internet, it needs a search engine, one of them is the Google search engine. The number of ... -
Analisis Kombinasi Algoritma One Time Pad dan Algoritma Elgamal dalam Pengamanan Pesan
(Universitas Sumatera Utara, 2014)Security of messages was required in order to prevent messages when sent can be opened by other parties that are not invited in which could ultimately threaten the safety and comfort of the sender and the receiver of the ... -
Analisis Hybrid Cryptosystem Algoritma Elgamal dan Algoritma Triple Des
(Universitas Sumatera Utara, 2014)In the world of cryptography, many algorithms used to encrypt. Two of these algorithms are the algorithm of El-gamal and Triple DES algorithms. El-Gamal algorithm and Triple DES algorithm is a variant of a block cipher ... -
3D Anatomi Organ Reproduksi Hewan Amfibi Ordo Anura Menggunakan Augmented Reality
(Universitas Sumatera Utara, 2021)Reproduction organs is an important component inside reproduction system especially for animals. Reproduction organs of animals which studied in general is reproduction organs of amphibian order Anura or frog. Lesson about ... -
Simulasi Antrian Pelayanan Berkelompok Oleh Banyak Server
(Universitas Sumatera Utara, 2013)Waiting in a queue is the most frequently occurs in everyday life. Queuing theory relate to all aspects of a situation where customers have to wait for a given service. Queueing models are discussed in this study is a ... -
Analisis Metode Deep Learning dalam Mengidentifikasi Penyakit Diabetic Retinopathy Melalui Citra Fundus Retina
(Universitas Sumatera Utara, 2021)Diabetic retinopathy (DR) is a serious retinal disease and is considered the leading cause of blindness and is strongly associated with people with diabetes. Ophthalmologists use optical coherence tomography (OCT) and ... -
Optimasi Turn Arround Time pada Penjadwalan Round Robin dengan Mencari Quantum Time Optimal menggunakan Algoritma Simulated Annealing
(Universitas Sumatera Utara, 2014)Scheduling processes are queuing need has managed by the operating system so that all processes can be served without any process that is in decline or too long for response, resulting in the time allotted to the process. ... -
Peringkasan Artikel Ilmiah Bahasa Indonesia Berbasis Rhetorical Role menggunakan Support Vector Machine
(Universitas Sumatera Utara, 2021)Scientific journal indexers make it easier for readers or researchers to find various scientific articles to be used as references or simply to improve one’s knowledge. However, being faced with a large number of choices ... -
Logika Fuzzy dan Program Linier untuk Pengoptimalan Perolehan Laba dalam Impor Barang
(Universitas Sumatera Utara, 2012)This study aims to construct a model in the process of importing goods to obtain the optimal profit from the sale of imported goods. This model includes the prediction of the resale price of imported goods in local markets ... -
Augmented Reality untuk Simulasi Pengoperasian Peralatan Elektronik Menggunakan Mikrokontroller ESP8266
(Universitas Sumatera Utara, 2021)Internet of Thing is a technology term that allows data to be transferred across of network, without need directing human-to-human or human-to-computer interaction. Development of Augmented Reality generally only displays ... -
Analisis Algoritma Ant Colony Optimization (ACO) dan Algoritma Inver-Over Operator (IOO) pada Traveling Salesman Problem (TSP)
(Universitas Sumatera Utara, 2016)The analysis carried out is an analysis aimed at finding a solution to the problem of the Traveling Salesman Problem (TSP) using a revolutionary algorithm. Traveling Salesman Problem (TSP) can be analyzed thoroughly using ... -
Analisis dan Penerapan Algoritma Subsitusi, Encoding Triple Base64 dan Vigenere Cipher untuk Keamanan Login pada Website
(Universitas Sumatera Utara, 2014)The issue of security is a very important issue for Internet-based applications . Public network are interconnected in a network internetakan very dangerous if the user id and password that the user entered is not encrypted ... -
Analisis Metode Seleksi Rank-Based Fitness Assigment dan One Point Crossover pada Penjadwalan Matakuliah
(Universitas Sumatera Utara, 2013)The lecture process in Al-Muslim University exactly for computer science faculty, have the lecture schedule in the begining semester the lecture schedule consisted of four basic components arrangement they are: lecture, ... -
Pengembangan Sistem Keamanan Komputer Mengakses Data Center Menggunakan Algoritma RSA pada Windows Server 2012 dalam Media Hotspot
(Universitas Sumatera Utara, 2015)Information or data stored in the data center can sustain an institution or company, if the datacenter successfully broken or disrupted by outsiders, it can cause huge losses to the owner of the data center or the data, ... -
Optimasi Jadwal Perkuliahan Dosen dengan Neighborhood Search Methods
(Universitas Sumatera Utara, 2015)Scheduling activities in a college lecture / campus is a complex and often experience difficulties, which led to the allocation of courses with professors and room often clashed with the schedule of courses, lecturers ... -
Analisis Penerapan Model Inferensi Fuzzy Tsukamoto dalam Penilaian Pencapaian Kompetensi Program Studi
(Universitas Sumatera Utara, 2015)This thesis proposes an evaluation model of study programs for students. The method is used by using Fuzzy Tsukamoto. Because Tsukamoto Method is very flexible and provides better performance and more consistent and ...