Daftar isi: BAGIAN PERTAMA Bab 1 Pengenalan robotika Bab 2 Mekatronika robot mobile Bab 3 Mekatronika robot hexapod Bab 4 Mekatronika humanoid robot Bab 5 Sistem elektonika robot Bab 6 Pengenalan dan instalasi mikroprosesor raspberry Pi Bab 7 Network mikroprosesor raspberry Pi Bab 8 Instalasi library python pada raspberry Bab 9 Dasar pemrograman python BAGIAN KEDUA Bab 10 Pemro…
Beyond Pseudo-Rotations in Pseudo-Euclidean Spaces presents for the first time a unified study of the Lorentz transformation group SO(m, n) of signature (m, n), m, n - N, which is fully analogous to the Lorentz group SO(1, 3) of Einstein's special theory of relativity. It is based on a novel parametric realization of pseudo-rotations by a vector-like parameter with two orientation parameters.…
Ideology and National Competitiveness shows how and why ideology affects the power, role, and behavior of managers in nine countries: Japan, the United States, Taiwan, Korea, Germany, France, the United Kingdom, Brazil, and Mexico. Effective managers must understand the ideological implications of their actions to gain competitive advantage. A research colloquium book.
Daftar Isi: 1 Pendahuluan 2 Ukuran statistic bagi data 3 Pekoeskripsian data 4 Peluang 5 Sebaran peubah acak 6 Beberapa sebaran peluang diskret 7 Sebaran normal 8 Teori penarikan contoh 9 Pendugaan parameter 10 Pengujian hipotesis 11 Regresi dan korelasi 12 Analisis ragam 13 Statistika nonparametric Indeks
Dengan kemajuan teknologi, layanan cloud semakin mudah diakses, terutama pada perangkat mobile Android. Beberapa aplikasi cloud yang populer termasuk MediaFire, Dropbox, dan Mega. Namun, selain digunakan untuk menyimpan data positif, layanan ini juga sering dimanfaatkan untuk menyimpan materi yang terkait dengan aktivitas kriminal, seperti penyebaran konten bajakan, kekerasan, terorisme, dan ko…
"This book provides a comprehensive introduction to hardware security, from specification to implementation. Applications discussed include embedded systems ranging from small RFID tags to satellites orbiting the earth. The authors describe a design and synthesis flow, which will transform a given circuit into a secure design incorporating counter-measures against fault attacks. In order to add…
This book explains compactly, without theoretical superstructure and with as little mathematical formalism as possible, the essential concepts in the encryption of messages and data worthy of protection. The focus is on the description of the historically and practically important cipher, signature and authentication methods. Both symmetric encryption and public-key ciphers are discussed. In ea…
Twinme adalah aplikasi IM privat berbasis seluler dengan enkripsi end-to-end untuk pengiriman pesan, panggilan suara, dan video berkualitas tinggi. Aplikasi ini mengutamakan keamanan informasi, memberikan manfaat besar bagi pengguna, tetapi juga berpotensi disalahgunakan untuk aktivitas kriminal, seperti jaringan narkoba. Penelitian ini menguji forensik aplikasi Twinme pada perangkat Android me…
Named a Best Book of the Year by New York Post! From one of our most innovative and celebrated authors, the definitive take on the wildest story of the year— the David-vs.-Goliath GameStop short squeeze, a tale of fortunes won and lost overnight that may end up changing Wall Street forever. Bestselling author Ben Mezrich offers a gripping, beat-by-beat account of how a loosely affiliate…