Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 6193 dokumen yang sesuai dengan query
cover
"This book covers IoT and Big Data from a technical and business point of view. The book explains the design principles, algorithms, technical knowledge, and marketing for IoT systems. 
It emphasizes applications of big data and IoT. It includes scientific algorithms and key techniques for fusion of both areas. Real case applications from different industries are offering to facilitate ease of understanding the approach. The book goes on to address the significance of security algorithms in combing IoT and big data which is currently evolving in communication technologies. 
The book is written for researchers, professionals, and academicians from interdisciplinary and transdisciplinary areas. The readers will get an opportunity to know the conceptual ideas with step-by-step pragmatic examples which makes ease of understanding no matter the level of the reader."
Boca Raton: CRC Press, 2020
e20534418
eBooks  Universitas Indonesia Library
cover
Fakultas Ilmu Komputer Universitas Indonesia, 1997
S26955
UI - Skripsi Membership  Universitas Indonesia Library
cover
Ishmah Naqiyya
"Perkembangan teknologi informasi dan internet dalam berbagai sektor kehidupan menyebabkan terjadinya peningkatan pertumbuhan data di dunia. Pertumbuhan data yang berjumlah besar ini memunculkan istilah baru yaitu Big Data. Karakteristik yang membedakan Big Data dengan data konvensional biasa adalah bahwa Big Data memiliki karakteristik volume, velocity, variety, value, dan veracity. Kehadiran Big Data dimanfaatkan oleh berbagai pihak melalui Big Data Analytics, contohnya Pelaku Usaha untuk meningkatkan kegiatan usahanya dalam hal memberikan insight yang lebih luas dan dalam. Namun potensi yang diberikan oleh Big Data ini juga memiliki risiko penggunaan yaitu pelanggaran privasi dan data pribadi seseorang. Risiko ini tercermin dari kasus penyalahgunaan data pribadi Pengguna Facebook oleh Cambridge Analytica yang berkaitan dengan 87 juta data Pengguna. Oleh karena itu perlu diketahui ketentuan perlindungan privasi dan data pribadi di Indonesia dan yang diatur dalam General Data Protection Regulation (GDPR) dan diaplikasikan dalam Big Data Analytics, serta penyelesaian kasus Cambridge Analytica-Facebook. Penelitian ini menggunakan metode yuridis normatif yang bersumber dari studi kepustakaan. Dalam Penelitian ini ditemukan bahwa perlindungan privasi dan data pribadi di Indonesia masih bersifat parsial dan sektoral berbeda dengan GDPR yang telah mengatur secara khusus dalam satu ketentuan. Big Data Analytics juga memiliki beberapa implikasi dengan prinsip perlindungan privasi dan data pribadi yang berlaku. Indonesia disarankan untuk segera mengesahkan ketentuan perlindungan privasi dan data pribadi khusus yang sampai saat ini masih berupa rancangan undang-undang.

The development of information technology and the internet in various sectors of life has led to an increase in data growth in the world. This huge amount of data growth gave rise to a new term, Big Data. The characteristic that distinguishes Big Data from conventional data is that Big Data has the characteristic of volume, velocity, variety, value, and veracity. The presence of Big Data is utilized by various parties through Big Data Analytics, for example for Corporation to incurease their business activities in terms of providing broader and deeper insight. But this potential provided by Big Data also comes with risks, which is violation of one's privacy and personal data. One of the most scandalous case of abuse of personal data is Cambridge Analytica-Facebook relating to 87 millions user data. Therefor it is necessary to know the provisions of privacy and personal data protection in Indonesia and which are regulated in the General Data Protection (GDPR) and how it applied in Big Data Analytics, as well as the settlement of the Cambridge Analytica-Facebook case. This study uses normative juridical methods sourced from library studies. In this study, it was found that the protection of privacy and personal data in Indonesia is still partial and sectoral which is different from GDPR that has specifically regulated in one bill. Big Data Analytics also has several implications with applicable privacy and personal data protection principles. Indonesia is advised to immediately ratify the provisions on protection of privacy and personal data which is now is still in the form of a RUU."
Depok: Fakultas Hukum Universitas Indonesia, 2020
S-pdf
UI - Skripsi Membership  Universitas Indonesia Library
cover
"This book highlights the state of the art and recent advances in Big Data clustering methods and their innovative applications in contemporary AI-driven systems. The book chapters discuss Deep Learning for Clustering, Blockchain data clustering, Cybersecurity applications such as insider threat detection, scalable distributed clustering methods for massive volumes of data; clustering Big Data Streams such as streams generated by the confluence of Internet of Things, digital and mobile health, human-robot interaction, and social networks; Spark-based Big Data clustering using Particle Swarm Optimization; and Tensor-based clustering for Web graphs, sensor streams, and social networks. The chapters in the book include a balanced coverage of big data clustering theory, methods, tools, frameworks, applications, representation, visualization, and clustering validation. "
Switzerland: Springer Nature, 2019
e20507207
eBooks  Universitas Indonesia Library
cover
Febtriany
"Saat ini kompetisi di industri telekomunikasi semakin ketat. Perusahaan telekomunikasi yang dapat tetap menghasilkan banyak keuntungan yaitu perusahaan yang mampu menarik dan mempertahankan pelanggan di pasar yang sangat kompetitif dan semakin jenuh. Hal ini menyebabkan perubahan strategi banyak perusahaan telekomunikasi dari strategi 'growth '(ekspansi) menjadi 'value added services'. Oleh karena itu, program mempertahankan pelanggan ('customer retention') saat ini menjadi bagian penting dari strategi perusahaan telekomunikasi. Program tersebut diharapkan dapat menekan 'churn' 'rate 'atau tingkat perpindahan pelanggan ke layanan/produk yang disediakan oleh perusahaan kompetitor.
Program mempertahankan pelanggan ('customer retention') tersebut tentunya juga diimplementasikan oleh PT Telekomunikasi Indonesia, Tbk (Telkom) sebagai perusahaan telekomunikasi terbesar di Indonesia. Program tersebut diterapkan pada berbagai produk Telkom, salah satunya Indihome yang merupakan 'home services' berbasis 'subscriber' berupa layanan internet, telepon, dan TV interaktif. Melalui kajian ini, penulis akan menganalisa penyebab 'churn' pelanggan potensial produk Indihome tersebut, sehingga Telkom dapat meminimalisir angka 'churn' dengan melakukan program 'customer retention' melalui 'caring' yang tepat.
Mengingat ukuran 'database' pelanggan Indihome yang sangat besar, penulis akan menganalisis data pelanggan tersebut menggunakan metoda 'Big Data Analytics'. 'Big Data' merupakan salah satu metode pengelolaan data yang sangat besar dengan pemetaan dan 'processing' data. Melalui berbagai bentuk 'output', implementasi 'big data' pada perusahaan akan memberikan 'value' yang lebih baik dalam pengambilan keputusan berbasis data.

Nowadays, telecommunication industry is very competitive. Telecommunication companies that can make a lot of profit is the one who can attract and retain customers in this highly competitive and increasingly saturated market. This causes change of the strategy of telecommunication companies from growth strategy toward value added services. Therefore, customer retention program is becoming very important in telecommunication companies strategy. This program hopefully can reduce churn rate or loss of potential customers due to the shift of customers to other similar products.
Customer retention program also implemented by PT Telekomunikasi Indonesia, Tbk (Telkom) as the leading telecommunication company in Indonesia. Customer retention program implemented for many Telkom products, including Indihome, a home services based on subscriber which provide internet, phone, and interactive TV. Through this study, the authors will analyze the cause of churn potential customers Indihome product, so that Telkom can minimize the churn number by doing customer retention program through the efficient caring.
Given by huge customer database the author will analyze using Big Data analytics method. Big Data is one method in data management that contain huge data, by mapping and data processing. Through various forms of output, big data implementation on the organization will provide better value in data-based decision making.
"
Depok: Fakultas Ekonomi dan Bisnis Universitas Indonesia, 2018
T-pdf
UI - Tesis Membership  Universitas Indonesia Library
cover
Ferry Astika Saputra
"

Ancaman keamanan cyber berupa aktivitas Botnet merupakan salah satu ancaman berbahaya yang dihadapi oleh komunitas internet. Para peneliti telah mengusulkan sistem deteksi intrusi (IDS) yang bekerja dengan menggunakan algoritma machine learning sebagai solusi alternatif dari IDS yang menggunakan metode signature dan metode anomali untuk mendeteksi aktivitas Botnet.

Permasalahan yang dihadapi adalah sulitnya membedakan antara trafik normal dengan trafik Botnet. Perlu adanya pemilihan fitur dari data set jaringan sehingga trafik Botnet dapat dideteksi dengan akurat. Dalam penelitian ini diusulkan metode baru yang meningkatkan kinerja IDS dalam mendeteksi Botnet. Metode yang diusulkan adalah dengan menggabungkan dua metode statistik yaitu low variance filter yang dikombinasikan dengan Pearson Correlation Filter yang selanjutnya disebut dengan  Hybrid Pearson Correlation Filter (HPCF) untuk diterapkan dalam tahap  pemilihan fitur. Pemilihan fitur dengan metode yang diajukan yaitu HPCF (Hybrid Pearson Correlation Filter) terbukti dapat meningkatkan efektifitas dan efisiensi dari IDS. Efektivitas diukur dengan menggunakan metrik performasi. Dari hasil eksperimen offline maupun reatime detection, DT lebih unggul dari tujuh model ML lainnya. Model DT-15 merupakan kombinasi terbaik dengan performasi diatas 95% untuk offline detection, 99% untuk Real-time detection.

Pemilihan fitur juga berpengaruh terhadap efisiensi yang diukur dari waktu komputasi pembelajaran mode dan waktu komputasi deteksi di jaringan sebenarnya. Model DT-15 merupakan kombinasi terbaik dengan rata-rata waktu 6,3 detik untuk pembelajaran model (offline detection) and 350 detik untuk waktu deteksi di jaringan sebenarnya (Real-time detection).

Tantangan untuk membuat arsitektur IDS yang dapat beradaptasi dengan  tekonologi komputasi awan juga menjadi topik dalam penelitian ini. Perubahan dinamis dalam arsitektur komputasi awan membutuhkan kemudahan dan fleksibilitas didistribusikan dan dikonfigurasi, dan sarana transportasi data yang paling andal ke defense center. Selain itu teknologi komputasi awan secara signifikan meningkatkan volume, kecepatan, dan variasi data yang harus diproses di pusat pertahanan. Ini berarti bahwa defense center membutuhkan teknologi big data. Snort adalah sistem deteksi dan pencegahan intrusi jaringan berbasis signature yang populer dan berpengaruh di komunitas Internet. Kekurangan dari Snort adalah keterbatasannya dalam menempatkan sensor dengan defense center yang harus terhubung dalam satau sama lain dalam satu jaringan. Hal ini bertolak belangkang dengan kebutuhan dari teknologi komputasi awan. Pada penelitian ini digunakan referensi arsitektur lambda. Dalam pengembangannya arsitektur terbagi menjadi tiga bagian: data source, data collecting dan data serving. Untuk data source dikembangkan aplikasi docker yang didalamnya terdapat aplikasi Snort IDS. Sedangkan untuk collecting data ddigunakan protokol MQTT sebagai saluran pengirimannya. MQTT lebih unggul dalam kemampuan pengirimanya dengan message rate 12 kali lebih besar dan latensi 62 kali lebih rendah dibandingkan dengan protokol Kafka Pub/Sub. Secara keseluruhan penelitian menghasilkan arsitektur baru big data penerapan sistem deteksi intrusi jaringan berbasis Snort di lingkungan komputasi awan.  Aplikasi NIDS Snort yang dibangun dengan merujuk dari arsitektur yang telah dibangun dapat diakses di https://github.com/Mata-Elang-Stable/MataElang-Platform/wiki.


Cyber security threats in the form of botnet activities are one of the dangerous threats faced by the internet community. Researchers have proposed an intrusion detection system (IDS) that works using machine learning algorithms as an alternative solution to IDS that uses signature and anomaly methods to detect botnet activity.

The problem faced is the difficulty of distinguishing between normal traffic and Botnet traffic. There needs to be a selection feature from the network data set to detect Botnet traffic accurately. This study proposes a new method to improve IDS performance in detecting botnets. The proposed method combines two statistical methods, namely the low variance filter and the Pearson Correlation Filter, referred to as the Hybrid Pearson Correlation Filter (HPCF), to be applied in the feature selection stage. Feature selection with the proposed method, namely HPCF (Hybrid Pearson Correlation Filter), is proven to increase the effectiveness and efficiency of IDS. Effectiveness is measured using performance metrics. From the results of offline and real-time detection experiments, DT is superior to the other seven ML models. The DT-15 model is the best combination, with over 95% performance for offline detection and 99% for real-time detection.

The selection of features also affects the efficiency measured by the computational time of mode learning and the computational time of detection in the real network. The DT-15 model is the best combination, with an average time of 6.3 seconds for the learning model (offline detection) and 350 seconds for detecting in the real network (real-time detection).

Developing an IDS architecture that can adapt to cloud computing technology is also a topic in this research. Dynamic changes in cloud architecture require the flexibility of configuring and the most reliable means of data transportation for the defense center. In addition, cloud computing significantly increases the volume, speed, and variety of data that must be centralized in the defense center. So this means that the defense center needs big data technology. Snort is a signature-based network intrusion detection and prevention system that is popular and influential in the Internet community. The drawback of Snort is its limitation in placing sensors with central defenses that must be connected to a single network, which is contrary to the needs of cloud computing technology.

In this study,  we refer to lambda architecture, which consists of three parts: data source, data collecting and serving. A docker application for the data source is developed, including the Snort IDS application. Meanwhile, the MQTT protocol is used as the delivery channel for collecting data. MQTT is superior in its delivery capabilities, with a message rate of 12 times more significant and latency 62 times lower than the Kafka Pub/Sub protocol. Overall, the research resulted in a new big data architecture for implementing a Snort-based network intrusion detection system in a cloud computing environment. Our proposed design and implementation can be accessed at https://github.com/Mata-Elang-Stable/MataElang-Platform/wiki.

"
Depok: Fakultas Teknik Universitas Indonesia, 2022
D-pdf
UI - Disertasi Membership  Universitas Indonesia Library
cover
Nainggolan, Dicky R.M.
"Data are the prominent elements in scientific researches and approaches. Data Science methodology is used to select and to prepare enormous numbers of data for further processing and analysing. Big Data technology collects vast amount of data from many sources in order to exploit the information and to visualise trend or to discover a certain phenomenon in the past, present, or in the future at high speed processing capability. Predictive analytics provides in-depth analytical insights and the emerging of machine learning brings the data analytics to a higher level by processing raw data with artificial intelligence technology. Predictive analytics and machine learning produce visual reports for decision makers and stake-holders. Regarding cyberspace security, big data promises the opportunities in order to prevent and to detect any advanced cyber-attacks by using internal and external security data."
Bogor: Universitas Pertahanan Indonesia, 2017
345 JPUPI 7:2 (2017)
Artikel Jurnal  Universitas Indonesia Library
cover
Loshin, David, 1963-
"
ABSTRACT
Big Data Analytics" will assist managers in providing an overview of the drivers for introducing big data technology into the organization and for understanding the types of business problems best suited to big data analytics solutions, understanding the value drivers and benefits, strategic planning, developing a pilot, and eventually planning to integrate back into production within the enterprise.
"
Amsterdam: Morgan Kaufmann, 2013
658.472 LOS b
Buku Teks  Universitas Indonesia Library
cover
Krishnan, Krish
Burlington: Elsevier Science, 2013
005.745 KRI d
Buku Teks  Universitas Indonesia Library
cover
"Access to big data, the “new commodity” for the 21st century economies, and its uses and potential abuses, has both conceptual and methodological impacts for the field of comparative and international education. This book examines, from a comparative perspective, the impact of the movement from the so-called knowledge-based economy towards the Intelligent Economy, which is premised upon the application of knowledge. Knowledge, the central component of the knowledge-based economy, is becoming less important in an era that is projected to be dominated and defined by the integration of complex technologies under the banner of the fourth industrial revolution. In this new era that blends the physical with the cyber-physical, the rise of education intelligence means that clients including countries, organizations, and other stakeholders are equipped with cutting-edge data in the form of predicative analytics, and knowledge about global educational predictions of future outcomes and trends. In this sense, this timely volume links the advent of this new technological revolution to the world of governance and policy formulation in education in order to open a broader discussion about the systemic and human implications for education of the emerging intelligent economy. By providing a unique comparative perspective on the Educational Intelligent economy, this book will prove invaluable for researchers and scholars in the areas of comparative education, artificial intelligence and educational policy."
Bingley: Emerald Publishing Limited, 2019
e20511918
eBooks  Universitas Indonesia Library
<<   1 2 3 4 5 6 7 8 9 10   >>