Materi seminar ini menjelaskan mengenai konsep dasar computer vision dan aplikasinya di era Industri 4.0. Materi seminar ini disampaikan pada acara Seminar Tahunan IT yang diselenggarakan oleh Lab ICT Universitas Budi Luhur
This presentation shows customers how IBM Security products and services help clients transform their security program, orchestrate their defenses throughout the attack lifecycle, and protect their most critical information and risks.
The Cybersecurity Risk Management Framework Strategy for Defense Platform Systems course prepares command leadership to implement the National Institute of Standards and Technology’s (NIST) cybersecurity Risk Management Framework (RMF) from a Platform Information Technology (PIT) perspective.
This one-day workshop reviews the five functions of cybersecurity that leadership must consider when making decisions about program resources and requirements.
Talking about Next-Gen Security Operation Center for IDNIC+APJII as representative from IDSECCONF. People-Centric SOC requires lot of investment on human in terms of quantity and quality, unfortunately, (good) IT security people are getting rare these days. Organisation need to put their investments more on technology, as in Industry 4.0, machines are getting more advanced to support Human on doing continuous and repetitive task.
Moving from “traditional” to next-gen SOC require proper plan, thats what this talk was about.
Membangun budaya organisasi melalui Digital MindsetSeta Wicaksana
Tantangan dan peluang untuk perilaku organisasi sangat besar dan berubah dengan cepat untuk meningkatkan produktivitas dan memenuhi tujuan bisnis.
Seperti yang dikatakan oleh artikel Harvard Business Review, "Ini adalah saat-saat yang menakutkan bagi para manajer".
Alasan tunggal yang diberikan untuk masa-masa menakutkan ini – meningkatnya bahaya perubahan yang mengganggu.
Sifat pekerjaan berubah begitu cepat sehingga struktur pekerjaan yang kaku menghambat pekerjaan yang harus dilakukan sekarang, dan itu dapat berubah secara drastis pada tahun, bulan, atau bahkan minggu berikutnya.
transformasi digital adalah tentang sumber daya manusia yang mengubah cara mereka dalam melakukan pendekatan pada masalah bisnis dan dimana mereka bisa menemukan solusi.
This presentation shows customers how IBM Security products and services help clients transform their security program, orchestrate their defenses throughout the attack lifecycle, and protect their most critical information and risks.
The Cybersecurity Risk Management Framework Strategy for Defense Platform Systems course prepares command leadership to implement the National Institute of Standards and Technology’s (NIST) cybersecurity Risk Management Framework (RMF) from a Platform Information Technology (PIT) perspective.
This one-day workshop reviews the five functions of cybersecurity that leadership must consider when making decisions about program resources and requirements.
Talking about Next-Gen Security Operation Center for IDNIC+APJII as representative from IDSECCONF. People-Centric SOC requires lot of investment on human in terms of quantity and quality, unfortunately, (good) IT security people are getting rare these days. Organisation need to put their investments more on technology, as in Industry 4.0, machines are getting more advanced to support Human on doing continuous and repetitive task.
Moving from “traditional” to next-gen SOC require proper plan, thats what this talk was about.
Membangun budaya organisasi melalui Digital MindsetSeta Wicaksana
Tantangan dan peluang untuk perilaku organisasi sangat besar dan berubah dengan cepat untuk meningkatkan produktivitas dan memenuhi tujuan bisnis.
Seperti yang dikatakan oleh artikel Harvard Business Review, "Ini adalah saat-saat yang menakutkan bagi para manajer".
Alasan tunggal yang diberikan untuk masa-masa menakutkan ini – meningkatnya bahaya perubahan yang mengganggu.
Sifat pekerjaan berubah begitu cepat sehingga struktur pekerjaan yang kaku menghambat pekerjaan yang harus dilakukan sekarang, dan itu dapat berubah secara drastis pada tahun, bulan, atau bahkan minggu berikutnya.
transformasi digital adalah tentang sumber daya manusia yang mengubah cara mereka dalam melakukan pendekatan pada masalah bisnis dan dimana mereka bisa menemukan solusi.
Presentasi ini ditujukan sebagai acuan sharing kepada peserta Hackathon Republic of IoT 2017. Mengenal bagaimana memilih karir dan juga kemampuan yang harus dimiliki di evolusi Industri 4.0 kedepannya.
Saat ini berbagai macam kebutuhan manusia telah banyak
menerapkan dukungan internet dan dunia digital sebagai wahana interaksi dan transaksi.
Isu-Isu Modal Manusia di Indonesia
1. Lemahnya kesadaran warga tentang pentingnya ekonomi dan teknologi digital.
2. Tingkat pengembalian yang rendah terhadap investasi pengembangan SDM karena tingginya
keluar masuk karyawan.
3. Ketidakseimbangan tenaga kerja yang beralih dari sektor industri ke sektor jasa.
4. Mobilitas ternaga kerja yang terbatas.
5. Tingginya pengangguran terdidik.
6. Kurangnya keterampilan dasar tenaga kerja dalam bidang teknologi digital.
7. Kelebihan kualifikasi sehingga tingkat utilisasi rendah.
8. Tingginya persoalan sosial di masyarakat.
9. Layanan publik yang masih buruk.
10. Pemerintah yang tidak tranparan dan akuntabel.
11. Masyarakat bersifat pasif dan kurang diberdayakan.
SOC Architecture - Building the NextGen SOCPriyanka Aash
Why are APTs difficult to detect
Revisit the cyber kill chain
Process orient detection
NextGen SOC Process
Building your threat mind map
Implement and measure your SOC
For every organization, effective cybersecurity is reliant on a careful deployment of technology, processes and people. The Global Knowledge cybersecurity perspective features a three-tiered organizational matrix, ranging from foundational to expert skills, coupled with eight functional specializations that encompass the features of a successful cybersecurity organization.
Cybersecurity isn’t a one-person job—it’s dependent on several different factors within an organization. This webinar will show you how to build a strong cyber defense by focusing on:
• The characteristics of winning cybersecurity teams
• The Crown – Organizational map and career progression
• The Castle – The eight functional specializations
• Architecture and data policy
• Data loss prevention
• Governance, risk and compliance
• Identity and access management
• Incident response and forensic analysis
• Penetration testing
• Secure DevOps
• Secure software development
• Building a winning cybersecurity organization
How to develop and govern a Technology Strategy in 10 weeksLeo Barella
This presentation covers the organizational layout, EA Services and EA Governance processes necessary to develop and govern a technology strategy effectively.
What We’ve Learned Building a Cyber Security Operation Center: du Case StudyPriyanka Aash
The cybersecurity landscape is rapidly evolving, with new threats and threat actors emerging, and traditional security operations centers (SOCs) need to be augmented accordingly. This session will detail the journey of du in building and continually enhancing its SOC, physically and philosophically, to best deal with attack detection (offensively and defensively) and response.
(Source: RSA Conference USA 2017)
ATTACKers Think in Graphs: Building Graphs for Threat IntelligenceMITRE - ATT&CKcon
From MITRE ATT&CKcon Power Hour January 2021
By Valentine Mairet, Security Researcher, McAfee
The MITRE ATT&CK framework is the industry standard to dissect cyberattacks into used techniques. At McAfee, all attack information is disseminated into different categories, including ATT&CK techniques. What results from this exercise is an extensive repository of techniques used in cyberattacks that goes back many years. Much can be learned from looking at historical attack data, but how can we piece all this information together to identify new relationships between threats and attacks? In her recent efforts, Valentine has embraced analyzing ATT&CK data in graphical representations. One lesson learned is that it is not just about merely mapping out attacks and techniques used into graphs, but the strength lies in applying different algorithms to answer specific questions. In this presentation, Valentine will showcase the results and techniques obtained from her research journey using graph and graph algorithms.
How To Present Cyber Security To Senior Management Complete DeckSlideTeam
This template is useful in presenting cybersecurity plan to higher authority. Cybersecurity officer will present it to top level management. It will help in determining the roles and responsibilities of senior management and executives who are responsible in handling risks. Firm will also optimize its cybersecurity risk framework. Firm will assess the current concerns that are impeding cybersecurity in terms of increase in cybercrimes, data breach and exposure and amount spent on settlements. It will also analyze firm its current cybersecurity framework. Firm will categorize various risk and will assess them on parameters such as risk likelihood and severity. The IT department will also improve their incident handling mechanism. Cybersecurity contingency plan will be initiated by firm. In this plan, firm will build an alternate site for backup maintenance. Backup site selection will be done by keeping certain parameters into consideration such as cost for implementation, duration, location, etc. The other plan essentials include business impact assessment, vital record maintenance, recovery task list maintenance, etc. The template also includes information regarding the role of personnel in terms of role and responsibilities of line managers, senior managers and executives in risk management. It also includes information related to the role of top management in ensuring effective information security governance. The information regarding the budget required for the cybersecurity plan implementation is also provided with staff training cost. https://bit.ly/35YJ5W9
This presentation was presented at Femina Woman & Enterpreneurship Seminar at April 18, 2009.
It discusses IT role in business as information sources, an enabler and also an enhancer for enterpeneurs.
This webinar focuses on the particular use case of graph databases in Network & IT-Management. This webinar is designed for people who work with Network Management at telecom companies or professionals within industries that handle and rely on complex networks.
We’ll start with an overview of Neo4j and Graph-thinking within Networks, explaining how Neworks are naturally modelled as graphs. We’ll explain how graph databases vastly help mitigate some of the major challenges the Network and Security Managers face on daily basis — including intrusions and other cyber crimes, performance optimization, outage simulations, fraud prevention and more.
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity
Presentasi ini ditujukan sebagai acuan sharing kepada peserta Hackathon Republic of IoT 2017. Mengenal bagaimana memilih karir dan juga kemampuan yang harus dimiliki di evolusi Industri 4.0 kedepannya.
Saat ini berbagai macam kebutuhan manusia telah banyak
menerapkan dukungan internet dan dunia digital sebagai wahana interaksi dan transaksi.
Isu-Isu Modal Manusia di Indonesia
1. Lemahnya kesadaran warga tentang pentingnya ekonomi dan teknologi digital.
2. Tingkat pengembalian yang rendah terhadap investasi pengembangan SDM karena tingginya
keluar masuk karyawan.
3. Ketidakseimbangan tenaga kerja yang beralih dari sektor industri ke sektor jasa.
4. Mobilitas ternaga kerja yang terbatas.
5. Tingginya pengangguran terdidik.
6. Kurangnya keterampilan dasar tenaga kerja dalam bidang teknologi digital.
7. Kelebihan kualifikasi sehingga tingkat utilisasi rendah.
8. Tingginya persoalan sosial di masyarakat.
9. Layanan publik yang masih buruk.
10. Pemerintah yang tidak tranparan dan akuntabel.
11. Masyarakat bersifat pasif dan kurang diberdayakan.
SOC Architecture - Building the NextGen SOCPriyanka Aash
Why are APTs difficult to detect
Revisit the cyber kill chain
Process orient detection
NextGen SOC Process
Building your threat mind map
Implement and measure your SOC
For every organization, effective cybersecurity is reliant on a careful deployment of technology, processes and people. The Global Knowledge cybersecurity perspective features a three-tiered organizational matrix, ranging from foundational to expert skills, coupled with eight functional specializations that encompass the features of a successful cybersecurity organization.
Cybersecurity isn’t a one-person job—it’s dependent on several different factors within an organization. This webinar will show you how to build a strong cyber defense by focusing on:
• The characteristics of winning cybersecurity teams
• The Crown – Organizational map and career progression
• The Castle – The eight functional specializations
• Architecture and data policy
• Data loss prevention
• Governance, risk and compliance
• Identity and access management
• Incident response and forensic analysis
• Penetration testing
• Secure DevOps
• Secure software development
• Building a winning cybersecurity organization
How to develop and govern a Technology Strategy in 10 weeksLeo Barella
This presentation covers the organizational layout, EA Services and EA Governance processes necessary to develop and govern a technology strategy effectively.
What We’ve Learned Building a Cyber Security Operation Center: du Case StudyPriyanka Aash
The cybersecurity landscape is rapidly evolving, with new threats and threat actors emerging, and traditional security operations centers (SOCs) need to be augmented accordingly. This session will detail the journey of du in building and continually enhancing its SOC, physically and philosophically, to best deal with attack detection (offensively and defensively) and response.
(Source: RSA Conference USA 2017)
ATTACKers Think in Graphs: Building Graphs for Threat IntelligenceMITRE - ATT&CKcon
From MITRE ATT&CKcon Power Hour January 2021
By Valentine Mairet, Security Researcher, McAfee
The MITRE ATT&CK framework is the industry standard to dissect cyberattacks into used techniques. At McAfee, all attack information is disseminated into different categories, including ATT&CK techniques. What results from this exercise is an extensive repository of techniques used in cyberattacks that goes back many years. Much can be learned from looking at historical attack data, but how can we piece all this information together to identify new relationships between threats and attacks? In her recent efforts, Valentine has embraced analyzing ATT&CK data in graphical representations. One lesson learned is that it is not just about merely mapping out attacks and techniques used into graphs, but the strength lies in applying different algorithms to answer specific questions. In this presentation, Valentine will showcase the results and techniques obtained from her research journey using graph and graph algorithms.
How To Present Cyber Security To Senior Management Complete DeckSlideTeam
This template is useful in presenting cybersecurity plan to higher authority. Cybersecurity officer will present it to top level management. It will help in determining the roles and responsibilities of senior management and executives who are responsible in handling risks. Firm will also optimize its cybersecurity risk framework. Firm will assess the current concerns that are impeding cybersecurity in terms of increase in cybercrimes, data breach and exposure and amount spent on settlements. It will also analyze firm its current cybersecurity framework. Firm will categorize various risk and will assess them on parameters such as risk likelihood and severity. The IT department will also improve their incident handling mechanism. Cybersecurity contingency plan will be initiated by firm. In this plan, firm will build an alternate site for backup maintenance. Backup site selection will be done by keeping certain parameters into consideration such as cost for implementation, duration, location, etc. The other plan essentials include business impact assessment, vital record maintenance, recovery task list maintenance, etc. The template also includes information regarding the role of personnel in terms of role and responsibilities of line managers, senior managers and executives in risk management. It also includes information related to the role of top management in ensuring effective information security governance. The information regarding the budget required for the cybersecurity plan implementation is also provided with staff training cost. https://bit.ly/35YJ5W9
This presentation was presented at Femina Woman & Enterpreneurship Seminar at April 18, 2009.
It discusses IT role in business as information sources, an enabler and also an enhancer for enterpeneurs.
This webinar focuses on the particular use case of graph databases in Network & IT-Management. This webinar is designed for people who work with Network Management at telecom companies or professionals within industries that handle and rely on complex networks.
We’ll start with an overview of Neo4j and Graph-thinking within Networks, explaining how Neworks are naturally modelled as graphs. We’ll explain how graph databases vastly help mitigate some of the major challenges the Network and Security Managers face on daily basis — including intrusions and other cyber crimes, performance optimization, outage simulations, fraud prevention and more.
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity
Attendance Management System using Face RecognitionNanditaDutta4
The project ppt presentation is made for the academic session for the completion of the work from Bharati Vidyapeeth Deemed University(IMED) MCA department
Biometric Systems - Automate Video Streaming Analysis with Azure and AWSRoberto Falconi
Perform near-real-time analysis on faces (emotions, gender, age, etc.), taken from a live video stream with Azure Cognitive Services and AWS Rekognition.
Materi webinar yang diselenggarakan oleh PHP Indonesia secara live di Facebook PHP-ID. Topik yang dibahas mengenai Machine Learning dengan PHP, baik sisi konsep maupun implementasinya.
Webinar Data Mining dengan Rapidminer | Universitas Budi LuhurAchmad Solichin
Materi Webinar Data Mining dengan Rapidminer di Universitas Budi Luhur yang diselenggarakan oleh mahasiswa S2 Ilmu Komputer Universitas Budi Luhur pada hari Jumat, 8 Januari 2021
TREN DAN IDE RISET BIDANG DATA MINING TERBARUAchmad Solichin
Presentasi ini menyajikan Tren dan Ide Riset Bidang DATA MINING Tahun ini. Wajib disimak! Disertai juga puluhan Contoh Paper Penelitian Terkini di bidang Data Mining. Saya menjelaskan banyak ide penelitian untuk skripsi, tesis, disertasi, dll. Simak sampe akhir ya.
Materi Seminar: Artificial Intelligence dengan PHPAchmad Solichin
Materi Seminar: Artificial Intelligence dengan PHP ini disampaikan pada Seminar online yang diselenggarakan oleh Lab ICT Universitas Budi Luhur pada hari Rabu, 12 Agustus 2020
Slide ini menjelaskan mengenai konsep dan langkah-langkah Algoritma Depth First Search (BFS) pada Graph.
Slide disusun oleh Achmad Solichin (http://achmatim.net)
Slide ini menjelaskan mengenai konsep dan langkah-langkah Algoritma Breadth First Search (BFS) pada Graph.
Slide disusun oleh Achmad Solichin | http://achmatim.net
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxEduSkills OECD
Andreas Schleicher presents at the OECD webinar ‘Digital devices in schools: detrimental distraction or secret to success?’ on 27 May 2024. The presentation was based on findings from PISA 2022 results and the webinar helped launch the PISA in Focus ‘Managing screen time: How to protect and equip students against distraction’ https://www.oecd-ilibrary.org/education/managing-screen-time_7c225af4-en and the OECD Education Policy Perspective ‘Students, digital devices and success’ can be found here - https://oe.cd/il/5yV
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
The Art Pastor's Guide to Sabbath | Steve ThomasonSteve Thomason
What is the purpose of the Sabbath Law in the Torah. It is interesting to compare how the context of the law shifts from Exodus to Deuteronomy. Who gets to rest, and why?
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
How to Split Bills in the Odoo 17 POS ModuleCeline George
Bills have a main role in point of sale procedure. It will help to track sales, handling payments and giving receipts to customers. Bill splitting also has an important role in POS. For example, If some friends come together for dinner and if they want to divide the bill then it is possible by POS bill splitting. This slide will show how to split bills in odoo 17 POS.
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
9. computer vision ?
Computer vision is an interdisciplinary field that deals with
how computers can be made to gain high-level
understanding from digital images or videos. From the
perspective of engineering, it seeks to automate tasks that the
human visual system can do.
13. Informasi apa saja yang dapat diekstraksi dari sebuah
gambar?
Geometric informationSemantic information
building
person
trashcan car car
ground
tree
tree
sky
door
window
building
roof
chimney
Outdoor scene
City European
…
14. Mengapa belajar computer vision?
• Vision is useful
• Vision is interesting
• Vision is difficult
• Half of primate cerebral cortex is devoted to visual processing
• Achieving human-level image understanding is probably
“AI-complete”
25. • Automated traffic law enforcement
• Intelligent Traffic Lights System
• Face recognition
• Pedestrian detection
• Object detection
• Facial expression
• ….
Dan masih banyak contoh lainnya….
36. Challenges or opportunities?
• Images are confusing, but they also reveal the structure of the world
through numerous cues
• Our job is to interpret the cues!
38. 1. Pengolahan Citra Digital
Cameras and sensors
Light and color
Linear filtering
Edge detection
* =
Feature extraction, feature trackingImage enhancement
39. 2. Fitting and Grouping
Fitting: Least squares
Hough transform
RANSAC
Alignment
43. Tools dan Pemrograman
• Fungsi sangat lengkap
• Powerfull
• Standar industri
• Komunitas dan referensi banyak
• Diajarkan di banyak universitas
• Berbayar
OpenCV (Open Source Computer Vision Library) is released under a BSD license
and hence it’s free for both academic and commercial use. It has C++, Python and
Java interfaces and supports Windows, Linux, Mac OS, iOS and Android. OpenCV
was designed for computational efficiency and with a strong focus on real-time
applications. Written in optimized C/C++, the library can take advantage of multi-
core processing.
44. Tools dan Pemrograman
GNU Octave is a high-level language, primarily intended for
numerical computations. It provides a convenient command line
interface for solving linear and nonlinear problems numerically, and
for performing other numerical experiments using a language that is
mostly compatible with Matlab. It may also be used as a batch-
oriented language.
GNU Octave is also freely redistributable software. You may
redistribute it and/or modify it under the terms of the GNU General
Public License (GPL) as published by the Free Software Foundation.
45. Tools dan Pemrograman
https://cloud.google.com/vision/
Google Cloud Vision API enables developers to perform image
processing by encapsulating powerful machine learning models in
a simple REST API that can be called in an application. Also, its
Optical Character Recognition (OCR) functionality enables you to
detect text in your images.
47. Tools dan Pemrograman
Amazon Rekognition makes it easy to add image and video analysis to your
applications. You just provide an image or video to the Rekognition API, and
the service can identify the objects, people, text, scenes, and activities, as well
as detect any inappropriate content. Amazon Rekognition also provides highly
accurate facial analysis and facial recognition on images and video that you
provide. You can detect, analyze, and compare faces for a wide variety of user
verification, people counting, and public safety use cases.
https://aws.amazon.com/rekognition/
48. Tools dan Pemrograman
Microsoft Azure Computer Vision API
https://azure.microsoft.com/en-in/services/cognitive-services/computer-vision/
Extract rich information from images to categorize and process visual data—
and perform machine-assisted moderation of images to help curate your
services.
49. “Semakin banyak yang kita pelajari,
semakin menunjukkan kebesaran,
karunia dan kuasa Tuhan”
50. Referensi
• Making Indonesia 4.0 - http://www.kemenperin.go.id/download/18384
• Beberapa slide berdasarkan materi Computer Vision dari Universitas Illinois -
http://slazebni.cs.illinois.edu/spring16
• https://hub.packtpub.com/top-10-computer-vision-tools/
• https://en.wikipedia.org/wiki/Computer_vision
• Beberapa gambar diambil melalui situs pencari Google.
51. Terima Kasih
@achmatim Achmad Solichin achmatim@gmail.com
slideshare.net/achmatim http://achmatim.net
Materi dapat diunduh di http://achmatim.net tanggal 23 Maret 2019