Beyond Pseudo-Rotations in Pseudo-Euclidean Spaces presents for the first time a unified study of the Lorentz transformation group SO(m, n) of signature (m, n), m, n - N, which is fully analogous to the Lorentz group SO(1, 3) of Einstein's special theory of relativity. It is based on a novel parametric realization of pseudo-rotations by a vector-like parameter with two orientation parameters.…
Buku ini memberi Anda gambaran holistik dan simpel mengenai konsep dasar machine learning, teknik-teknik dan metode-metode tingkat dasar dan tingkat lanjut, serta aplikasinya dalam berbagai bidang terkini. Pembahasan dimulai dari konsep dasar paling sederhana hingga yang kompleks dengan gradasi yang lembut. Setiap teknik dan metode dibahas dari ide dasar, motivasi, visualisasi, formulasi matema…
"Science world luminary John Brockman assembles twenty-five of the most important scientific minds, people who have been thinking about the field artificial intelligence for most of their careers, for an unparalleled round-table examination about mind, thinking, intelligence and what it means to be human"-- Provided by publisher.
This book provides use case scenarios of machine learning, artificial intelligence, and real-time domains to supplement cyber security operations and proactively predict attacks and preempt cyber incidents. The authors discuss cybersecurity incident planning, starting from a draft response plan, to assigning responsibilities, to use of external experts, to equipping organization teams to addres…
This book presents various areas related to cybersecurity. Different techniques and tools used by cyberattackers to exploit a system are thoroughly discussed and analyzed in their respective chapters. The content of the book provides an intuition of various issues and challenges of cybersecurity that can help readers to understand and have awareness about it. It starts with a very basic introdu…
Penelitian ini mengeksplorasi pemanfaatan Large Language Models (LLMs), seperti ChatGPT, dalam pembelajaran Secure coding di Politeknik Siber dan Sandi Negara (Poltek SSN). Dengan latar belakang peningkatan ancaman keamanan siber dan kurangnya perhatian terhadap praktik Secure coding, LLMs digunakan sebagai asisten virtual dengan metode Prompt Engineering untuk memberikan umpan balik langsung d…
This book discusses the evolution of security and privacy issues and brings related technological tools, techniques, and solutions into one single source. The book will take readers on a journey to understanding the security issues and possible solutions involving various threats, attacks, and defense mechanisms, which include IoT, cloud computing, Big Data, lightweight cryptogra…
Indonesia saat ini dihadapkan oleh berbagai potensi dan tantangan di masa depan seperti bonus demografi, Revolusi Industri 4.0 dengan teknologi Big Data. Al. Clouds dan Cyber, serta pandemi COVID-19. Disrupsi teknologi selalu dikaitkan dengan negative sums game. artinya mesin dan automation menyebabkan hilangnya 23 juta lowongan kerja pada 2030. Namun studi dari McKinsey: September 2019 menyebu…
Buku ini membahas teknik searching, reasoning, planning dan learning dan metode-metode yang ada didalamnya dengan beragam ilustrasi dan studi kasus untuk mempermudah pemahaman dan memperjelas perbedaan diantara keempat teknik tersebut. Daftar Isi: Bab 1 Pendahuluan Bab 2 Searching Bab 3 Reasoning Bab 4 Planning Bab 5 Learning Bab 6 Studi kasus Bab 7 Penutup Daftar pustaka