Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 6006 dokumen yang sesuai dengan query
cover
Joshi, Mark
"This innovative textbook introduces a new pattern-based approach to learning proof methods in the mathematical sciences. Readers will discover techniques that will enable them to learn new proofs across different areas of pure mathematics with ease. The patterns in proofs from diverse fields such as algebra, analysis, topology and number theory are explored. Specific topics examined include game theory, combinatorics, and Euclidean geometry, enabling a broad familiarity.
The author, an experienced lecturer and researcher renowned for his innovative view and intuitive style, illuminates a wide range of techniques and examples from duplicating the cube to triangulating polygons to the infinitude of primes to the fundamental theorem of algebra. Intended as a companion for undergraduate students, this text is an essential addition to every aspiring mathematician’s toolkit."
Switzerland: Springer International Publishing, 2015
e20528436
eBooks  Universitas Indonesia Library
cover
Gila Hanna
"This book, resulting from the 19th ICMI Study, brings together a variety of viewpoints on issues such as : (1) the potential role of reasoning and proof in deepening mathematical understanding in the classroom as it does in mathematical practice, (2) the developmental nature of mathematical reasoning and proof in teaching and learning from the earliest grades, and (3) the development of suitable curriculum materials and teacher education programs to support the teaching of proof and proving."
Dordrecht, Netherlands: Springer, 2012
e20400684
eBooks  Universitas Indonesia Library
cover
Sundstrom, Ted
New Jersey: Pearson-Prentice Hall, 2007
511.36 SUN m
Buku Teks  Universitas Indonesia Library
cover
Rademaker, Alexandre, editor
"A proof theory for description logics introduces sequent calculi and natural deduction for some DLs (ALC, ALCQ). Cut-elimination and normalization are proved for the calculi. The author argues that such systems can improve the extraction of computational content from DLs proofs for explanation purposes."
London: Springer, 2012
e20406298
eBooks  Universitas Indonesia Library
cover
Sulistiandriatmoko
"Alat bukti elektronik telah diatur dalam Pasal 86 Undang-Undang Narkotika. Alat bukti elektronik tersebut selalu diandalkan pada setiap tingkatan peradilan, baik pada tingkat penyidikan, penuntutan maupun pemeriksaan di pengadilan. Kekuatan pembuktian alat bukti elektronik sebagai alat bukti yang sah dapat dilihat dalam Putusan Pengadilan Negeri Jakarta Barat nomor 1094/Pid.Sus/2015 PN.JKT.BRT, 13 Nopember 2015 yang memvonis terdakwa Wong Chi Ping dengan hukuman mati dan putusan banding Pengadilan Tinggi DKI Jakarta nomor 307/PID/2015/PT.DKI, 18 Januari 2016  juga telah menguatkan putusan Pengadilan Negeri Jakarta Barat tersebut. Alat bukti elektronik yang dijadikan pertimbangan Hakim dalam memutus perkara tersebut berasal dari berkas dakwaan Jaksa dan Jaksa mendapatkan dari berkas perkara penyidikan yang diajukan oleh Penyidik BNN. Legalitas penyidik BNN melakukan penyadapan untuk mendapatkan alat bukti elektronik diatur pada Pasal 75 huruf i Undang-Undang Narkotika.


Electronic evidence is provided in Article 86 of the Narcotics Act. Such electronic evidence is always relied upon at every level of the judiciary, whether at the level of investigation, prosecution or trial in court. The strength of proof of electronic evidence as a valid evidence can be seen in the Decision of West Jakarta District Court number 1094/Pid.Sus/2015/PN.JKT.BRT, 13 November 2015 which sentenced the defendant Wong Chi Ping to death sentence and appeal decision of DKI High Court Jakarta number 307/PID/2015/PT.DKI, January 18, 2016 has also strengthened the decision of West Jakarta District Court. Electronic evidence which the Judge takes into consideration in deciding the case comes from the indictment file of the Prosecutor and the Prosecutor obtained from the file of the investigation case filed by the BNN Investigator. Legality investigator BNN intercepts to obtain electronic evidence is set in Article 75 letter i Narcotics Ac

"
Depok: Fakultas Hukum Universitas Indonesia, 2018
S-pdf
UI - Skripsi Membership  Universitas Indonesia Library
cover
Widyaningsih Peni Lestari
"[ABSTRAK
Harimau memangsa ternak merupakan bentuk konflik manusia-harimau yang
paling umum di banyak negara termasuk di Indonesia. Konflik ini menyebabkan
kerugian ekonomi masyarakat. Salah satu upaya untuk mencegah predasi ternak
adalah dengan membangun kandang ternak anti serangan harimau atau Tiger
Proof Enclosure (TPE). TPE dapat melindungi ternak, akan tetapi TPE yang tidak
terawat akan berkurang kekuatannya untuk mencegah serangan harimau. Menurut
theory of planned behavior, perilaku dapat diprediksi dari intensi. Menguatkan
prediktor utama intensi akan meningkatkan intensi perilaku. Norma subyektif
merupakan prediktor utama intensi suami merawat TPE dan istri merupakan
significant others yang memiliki pengaruh paling besar pada norma subyektif
suami dalam merawat TPE. Oleh karena itu fokus intervensi pada penelitian ini
adalah untuk meningkatkan dukungan istri terhadap perilaku suami merawat TPE.
Setelah intervensi, diperoleh peningkatan dukungan istri yang signifikan secara
statistik (t = 2.491, df = 23, p = .020).

ABSTRACT
Depredation on domestic animals or livestock are the most common type of
human-tiger conflict (HTC) in many countries including Indonesia. Human
suffered economic loss because of livestock depredation. Tiger Proof Enclosure
(TPE) has been introduce to improve the livestock enclosure to prevent tiger
depredation on livestock. TPE was able to protect livestock, but poor maintained
TPE will lose its strength to prevent tiger?s attack. According to theory of planned
behavior, behavior can be predicted from intention. Strengthening the main
predictor of intention will increase the behavior?s intention. Subjective norms is
the main predictor of intention to maintain TPE, and wife is the most influental
significant others in a husband?s subjective norms. Thus the focus of the
intervention program is to increase wife?s support towards the husband?s behavior
to maintain tiger proof enclosure. Intervention program resulted in statistically
significant enhancement of wife?s support (t = 2.491, df = 23, p = .020).;Depredation on domestic animals or livestock are the most common type of
human-tiger conflict (HTC) in many countries including Indonesia. Human
suffered economic loss because of livestock depredation. Tiger Proof Enclosure
(TPE) has been introduce to improve the livestock enclosure to prevent tiger
depredation on livestock. TPE was able to protect livestock, but poor maintained
TPE will lose its strength to prevent tiger?s attack. According to theory of planned
behavior, behavior can be predicted from intention. Strengthening the main
predictor of intention will increase the behavior?s intention. Subjective norms is
the main predictor of intention to maintain TPE, and wife is the most influental
significant others in a husband?s subjective norms. Thus the focus of the
intervention program is to increase wife?s support towards the husband?s behavior
to maintain tiger proof enclosure. Intervention program resulted in statistically
significant enhancement of wife?s support (t = 2.491, df = 23, p = .020)., Depredation on domestic animals or livestock are the most common type of
human-tiger conflict (HTC) in many countries including Indonesia. Human
suffered economic loss because of livestock depredation. Tiger Proof Enclosure
(TPE) has been introduce to improve the livestock enclosure to prevent tiger
depredation on livestock. TPE was able to protect livestock, but poor maintained
TPE will lose its strength to prevent tiger’s attack. According to theory of planned
behavior, behavior can be predicted from intention. Strengthening the main
predictor of intention will increase the behavior’s intention. Subjective norms is
the main predictor of intention to maintain TPE, and wife is the most influental
significant others in a husband’s subjective norms. Thus the focus of the
intervention program is to increase wife’s support towards the husband’s behavior
to maintain tiger proof enclosure. Intervention program resulted in statistically
significant enhancement of wife’s support (t = 2.491, df = 23, p = .020).]"
2015
T43323
UI - Tesis Membership  Universitas Indonesia Library
cover
Rao, B.L.S. Prakasa
"This book gives a comprehensive review of results for associated sequences and demimartingales developed so far, with special emphasis on demimartingales and related processes. Probabilistic properties of associated sequences, demimartingales and related processes are discussed in the first six chapters. Applications of some of these results to some problems in nonparametric statistical inference for such processes are investigated in the last three chapters."
Basel: [Springer , ], 2012
e20419277
eBooks  Universitas Indonesia Library
cover
Leo Jimmi Agustinus
"Membahas penagnanan perkara tindak pidana pencucian uang khususnya dalam hal perlu tudaknya pembuktian tindak pidana asal dalam penanganan tindak pidana pidana pencucian uang dan kaitan antara dua tindak pidana tersebut. Penelitian ini adalah penelitian hukum normatif yang bersipat deskriptis analisis, dimana data yang diperoleh akan dianalisis secara kualitatif, Penelitian ini berkesimpulan bahwa adanya hubungan berkelanjtan yang terpisah dan berdiri sendii sendiri antara tindak pidana asal dan tindak pidana pencucian uang, adanya kesamaan bentuk antara tindak pidana pencucian uang dngan tindak pidana penadahan, dan dalam penanganan tindak pidana pencucian uang tidak diperlukan untuk pembuktian terlebih dahlu tindak pidana asalnya. Penelitian ini juga menyarankan agar setiap komponen dalam sistem peradlan pidana untuk mempunyai kesamaan sikap mengenai kesimpulan penelitian ini menyarankan bagi penegak hukum untuk memberikan ruang seluasnya bagi terdakwa tindak pidana pencucian uang untuk menggunakan haknya sesuai UUPPTIPPU.

This thesis details on administering cases on money laundering criminal act specifically on whether or not os required origin criminal act burden of proof in money laundering criminal act and connection between both criminal act. This study shall be a normative legal study and analysis descriptive in nature, whereby the collected data will be analyzed qualitatively. This study concluded that there exists a separate and independent sustainable relationship between origin criminal act and money laundering criminal act, a similarity of form between money laundering criminal act and fencing criminal act, and in administering money laundry criminal act it is not required to first proof its origin criminal act. Further, this study suggests for each component in the criminal justice system to have a unity of attitude to the conclusion of this study for the formation of an integrated criminal justice system. This study also encourages legal practitioners to provide the broadest space to money laundering criminal defendant to utilize his/her right under UUPPTPPU."
Depok: Fakultas Hukum Universitas Indonesia, 2011
T28944
UI - Tesis Open  Universitas Indonesia Library
cover
Dian Fitriyani
Depok: Fakultas Matematika dan Ilmu Pengetahuan Alam Universitas Indonesia, 2010
S27851
UI - Skripsi Open  Universitas Indonesia Library
cover
Efron, Bradley
"The jackknife and the bootstrap are nonparametric methods for assessing the errors in a statistical estimation problem. They provide several advantages over the traditional parametric approach: the methods are easy to describe and they apply to arbitrarily complicated situations; distribution assumptions, such as normality, are never made.
This monograph connects the jackknife, the bootstrap, and many other related ideas such as cross-validation, random subsampling, and balanced repeated replications into a unified exposition. The theoretical development is at an easy mathematical level and is supplemented by a large number of numerical examples.
The methods described in this monograph form a useful set of tools for the applied statistician. They are particularly useful in problem areas where complicated data structures are common, for example, in censoring, missing data, and highly multivariate situations."
Philadelphia: Society for Industrial and Applied Mathematics, 1994
e20443362
eBooks  Universitas Indonesia Library
<<   1 2 3 4 5 6 7 8 9 10   >>