Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 17797 dokumen yang sesuai dengan query
cover
Faul, A.C.
"The emphasis of the book is on the question of Why – only if why an algorithm is successful is understood, can it be properly applied, and the results trusted. Algorithms are often taught side by side without showing the similarities and differences between them. This book addresses the commonalities, and aims to give a thorough and in-depth treatment and develop intuition, while remaining concise."
London: CRC press, 2020
e20528988
eBooks  Universitas Indonesia Library
cover
Rebala, Gopinath
"Just like electricity, Machine Learning will revolutionize our life in many ways-some of which are not even conceivable today. This book provides a thorough conceptual understanding of Machine Learning techniques and algorithms. Many of the mathematical concepts are explained in an intuitive manner. The book starts with an overview of machine learning and the underlying Mathematical and Statistical concepts before moving onto machine learning topics. It gradually builds up the depth, covering many of the present day machine learning algorithms, ending in Deep Learning and Reinforcement Learning algorithms. The book also covers some of the popular Machine Learning applications. The material in this book is agnostic to any specific programming language or hardware so that readers can try these concepts on whichever platforms they are already familiar with."
Switzerland: Springer Nature, 2019
e20506268
eBooks  Universitas Indonesia Library
cover
Mitchell, Tom M.
New York: McGraw-Hill, 1997
006.31 MIT m
Buku Teks SO  Universitas Indonesia Library
cover
Khalid Muhammad
"ABSTRAK
Machine learning dapat digunakan untuk menganalisis berbagai macam jenis data, termasuk data yang umumnya bersifat rahasia. Sebuah model machine learning yang sudah dilatih dapat dibungkus dalam sebuah aplikasi web sehingga model tersebut dapat diakses dengan mudah via internet. Namun, jika data yang ingin dianalisis bersifat pribadi atau rahasia seperti data medis atau keuangan maka hal ini menjadi masalah, pengelola aplikasi itu dapat saja membaca data rahasia yang di-input. Skema enkripsi homomorfis dapat digunakan untuk menghadapi masalah ini. Salah satu skema enkripsi yang memiliki sifat homomorfis ialah skema enkripsi Paillier. Pada peneltitian ini ditunjukkan bahwa suatu jenis model machine learning tertentu dapat menerima input data yang terenkripsi dengan skema enkripsi Paillier dan menghasilkan output yang terenkripsi dengan kunci yang sama. Konsep ini didemonstrasikan dengan melatih sebuah model machine learning dengan database MNIST. Kemudian, model ini diuji dengan data test yang terenkripsi dengan skema enkripsi Paillier. Hasil percobaan menunjukkan akurasi model mencapai 92,92.

ABSTRACT
Machine learning can be used to analyze various kinds of data, including confidential data such us medical or financial data. A trained machine learning model can be wrapped in a web application so that people can access it easily via internet. But if the data to be analyzed is private or confidential, this will cause a problem, the application administrator may read our input. Homomorphic encryption scheme can be used to overcome this kind of problem. Paillier encryption scheme is one kind of encryption scheme that has homomorphic property. In this research, it will be shown that one type of machine learning model can take an input encrypted by Paillier encryption scheme and produce an output encrypted with the same key. This concept is demonstrated by training a machine learning model with the MNIST database of hand written digits. This model will be tested with the test data encrypted with Paillier encryption scheme. The experiment shows that the model achieved 92.92 accuracy."
2018
S-Pdf
UI - Skripsi Membership  Universitas Indonesia Library
cover
Boca Raton: CRC Press, Taylor & Francis Group, 2008
572.8 INT
Buku Teks  Universitas Indonesia Library
cover
"Written by leading researchers, this complete introduction brings together all the theory and tools needed for building robust machine learning in adversarial environments. Discover how machine learning systems can adapt when an adversary actively poisons data to manipulate statistical inference, learn the latest practical techniques for investigating system security and performing robust data analysis, and gain insight into new approaches for designing effective countermeasures against the latest wave of cyber-attacks. Privacy-preserving mechanisms and the near-optimal evasion of classifiers are discussed in detail, and in-depth case studies on email spam and network security highlight successful attacks on traditional machine learning algorithms. Providing a thorough overview of the current state of the art in the field, and possible future directions, this groundbreaking work is essential reading for researchers, practitioners and students in computer security and machine learning, and those wanting to learn about the next stage of the cybersecurity arms race."
Cambridge: Cambridge University Press, 2019
006.31 ADV
Buku Teks SO  Universitas Indonesia Library
cover
Unpingco, José
"This book, fully updated for Python version 3.6+, covers the key ideas that link probability, statistics, and machine learning illustrated using Python modules in these areas. All the figures and numerical results are reproducible using the Python codes provided. The author develops key intuitions in machine learning by working meaningful examples using multiple analytical methods and Python codes, thereby connecting theoretical concepts to concrete implementations. Detailed proofs for certain important results are also provided. Modern Python modules like Pandas, Sympy, Scikit-learn, Tensorflow, and Keras are applied to simulate and visualize important machine learning concepts like the bias/variance trade-off, cross-validation, and regularization. Many abstract mathematical ideas, such as convergence in probability theory, are developed and illustrated with numerical examples.
This updated edition now includes the Fisher Exact Test and the Mann-Whitney-Wilcoxon Test. A new section on survival analysis has been included as well as substantial development of Generalized Linear Models. The new deep learning section for image processing includes an in-depth discussion of gradient descent methods that underpin all deep learning algorithms. As with the prior edition, there are new and updated *Programming Tips* that the illustrate effective Python modules and methods for scientific programming and machine learning. There are 445 run-able code blocks with corresponding outputs that have been tested for accuracy. Over 158 graphical visualizations (almost all generated using Python) illustrate the concepts that are developed both in code and in mathematics. We also discuss and use key Python modules such as Numpy, Scikit-learn, Sympy, Scipy, Lifelines, CvxPy, Theano, Matplotlib, Pandas, Tensorflow, Statsmodels, and Keras.
This book is suitable for anyone with an undergraduate-level exposure to probability, statistics, or machine learning and with rudimentary knowledge of Python programming."
Switzerland: Springer Cham, 2019
e20510997
eBooks  Universitas Indonesia Library
cover
"The two-volume set LNCS 7552 + 7553 constitutes the proceedings of the 22nd International Conference on Artificial Neural Networks, ICANN 2012, held in Lausanne, Switzerland, in September 2012. The 162 papers included in the proceedings were carefully reviewed and selected from 247 submissions. They are organized in topical sections named, theoretical neural computation, information and optimization, from neurons to neuromorphism, spiking dynamics, from single neurons to networks, complex firing patterns, movement and motion, from sensation to perception, object and face recognition, reinforcement learning, bayesian and echo state networks, recurrent neural networks and reservoir computing, coding architectures, interacting with the brain, swarm intelligence and decision-making, mulitlayer perceptrons and kernel networks, training and learning, inference and recognition, support vector machines, self-organizing maps and clustering, clustering, mining and exploratory analysis, bioinformatics, and time weries and forecasting."
Berlin: Springer-Verlag, 2012
e20410546
eBooks  Universitas Indonesia Library
cover
"The two-volume set LNCS 7552 + 7553 constitutes the proceedings of the 22nd International Conference on Artificial Neural Networks, ICANN 2012, held in Lausanne, Switzerland, in September 2012. The 162 papers included in the proceedings were carefully reviewed and selected from 247 submissions. They are organized in topical sections named, theoretical neural computation, information and optimization, from neurons to neuromorphism, spiking dynamics, from single neurons to networks, complex firing patterns, movement and motion, from sensation to perception, object and face recognition, reinforcement learning, bayesian and echo state networks, recurrent neural networks and reservoir computing, coding architectures, interacting with the brain, swarm intelligence and decision-making, mulitlayer perceptrons and kernel networks, training and learning, inference and recognition, support vector machines, self-organizing maps and clustering, clustering, mining and exploratory analysis, bioinformatics, and time weries and forecasting."
Berlin: Springer-Verlag, 2012
e20410547
eBooks  Universitas Indonesia Library
cover
Kivlan Rafly Bahmid
"Salah satu aspek pertahanan negara yang cukup penting adalah pertahanan udara negara. Sayangnya, Industri Pertahanan Indonesia masih cukup kurang mendukung. Salah satu isu yang diakibatkan oleh masalah ini adalah kurang berkembangnya teknologi pertahanan udara di Indonesia dibanding dengan negara-negara lain, seperti teknologi pengendalian pesawat, seperti Unmanned Aerial Vehicle (UAV). Oleh karena ini, diperlukan pengembangan teknologi pengendalian pesawat yang mandiri dan bersetara dengan pihak luar negeri. Dinamika penerbangan merupakan masalah yang bersifat non-linear, time-varying, memiliki coupling, dan terefek oleh gangguan eksternal. Untuk memecahkan masalah ini, diperlukan pengendali pesawat berbasis metode Direct Inverse Control. Direct Inverse Control memerlukan sistem identifikasi dari sistem yang ingin dikendalikan agar dapat mengembangkan neural network inverse. Pada penelitian ini, diajukan sistem identifikasi pesawat Cessna-172P berbasis Deep Neural Network dan Recurrent Neural Network. Kinerja kedua sistem identifikasi sudah cukup dalam mereplikasikan dinamika penerbangan pesawat Cessna-172P. Dari analisis kinerja kedua sistem identifikasi, sistem identifikasi berbasis recurrent neural network menghasilkan kesahalan prediksi yang lebih rendah, tetapi menggunakan daya dan waktu komputasi yang lebih banyak.

One important aspect of national defense is the country's air defense. Unfortunately, the Indonesian Defense Industry still lacks sufficient support. One issue resulting from this problem is the underdevelopment of air defense technology in Indonesia compared to other countries, such as aircraft control technology like Unmanned Aerial Vehicles (UAV). Therefore, the development of independent aircraft control technology that is on par with foreign counterparts is needed. Flight dynamics pose nonlinear, time-varying challenges with coupling and are affected by external disturbances. To address this problem, an aircraft controller based on the Direct Inverse Control method is required. Direct Inverse Control necessitates system identification of the desired controlled system to develop an inverse neural network. In this study, a Deep Neural Network and Recurrent Neural Network-based identification system for the Cessna-172P aircraft is proposed. Both identification systems perform well in replicating the flight dynamics of the Cessna-172P aircraft. From the performance analysis of both identification systems, the recurrent neural network-based identification system produces lower prediction errors but requires more computational power and time."
Depok: Fakultas Teknik Universitas Indonesia, 2023
S-pdf
UI - Skripsi Membership  Universitas Indonesia Library
<<   1 2 3 4 5 6 7 8 9 10   >>