Browse Items (10283 total)

document (1).pdf
Objective: Security, privacy, perceived value, and trust are essential elements in reusing intention in an e-commerce application. The lower the security, privacy, perceived value, and trust of a consumer will reduce the reuse intention of an…

6_A+Study+on+Wearable+Tech+Interfaces+and+Perception+Cognitive+AI-Enabled+Device.pdf
In our paper, we explore the possibility of utilizing state-of-the-art hardware architecture to develop an interactive Artificial Intelligence(AI) based virtual agent in an Internet of Things (IoT) enabled smart glass. In contrast to the traditional…

16725-Article Text-73213-2-10-20231006.pdf
In this paper, a 180-nm CMOS ring oscillator design, made with halo-implanted transistors andoperating in the weak inversion region, is proposed, based on an undergraduate integrated circuit design course methodology for building…

2_A+Survey+of+Deep+Learning+Solutions+for+Anomaly.pdf
Deep learning has proven to be a landmark computing approach to the computer vision domain. Hence, it has been widely applied to solve complex cognitive tasks like the detection of anomalies in surveillance videos. Anomaly detection in this case is…

25512-68059-1-PB.pdf
Whenever there is too much information out there, it is desirable to summarize. If humans are trying to create the summary, it will take lot of time. Now to make the problem of summarizing information easier and more effortless one can automate the…

23093-Article Text-95867-1-10-20251103.pdf
The fifth-generation (5G) mobile communication system represents a major advancement in wireless technology, relying on effective radio spectrum
management to ensure optimal performance. Among the available frequency ranges, the 5G low-band…

Tags: ,Repository, Repository Horizon University Indonesia, Repository Universitas Horizon Indonesia, Horizon.ac.id, Horizon University Indonesia, Universitas Horizon Indonesia, HorizonU, Repo Horizon , ,Repository, Repository Horizon University Indonesia, Repository Universitas Horizon Indonesia, Horizon.ac.id, Horizon University Indonesia, Universitas Horizon Indonesia, HorizonU, Repo Horizon , ,Repository, Repository Horizon University Indonesia, Repository Universitas Horizon Indonesia, Horizon.ac.id, Horizon University Indonesia, Universitas Horizon Indonesia, HorizonU, Repo Horizon , ,Repository, Repository Horizon University Indonesia, Repository Universitas Horizon Indonesia, Horizon.ac.id, Horizon University Indonesia, Universitas Horizon Indonesia, HorizonU, Repo Horizon ,

4_A+Systematic+Literature+Review+of+Hausa+Natural.pdf
The processing of natural languages is an area of computer science that has gained growing attention recently. NLP helps computers recognize, in other words, the ways in which people use their language. NLP research, however, has been performed…

7791-32184-1-PB.pdf
Relationship marketing (RM) is an important issue in every business because it is
a key component of long-term business success. Small and Medium Enterprises
(SMEs) are an important business sector in economic growth. This study aims to
find out…

1-s2.0-S2444883424000251-main.pdf
This study aims to systematically examine the Pay-What-You-Want (PWYW) pricing model, which has become increasingly popular among innovative strategies. The PWYW model offers an unconventional approach by giving consumers the power to determine the…

Tags: ,Repository, Repository Horizon University Indonesia, Repository Universitas Horizon Indonesia, Horizon.ac.id, Horizon University Indonesia, Universitas Horizon Indonesia, HorizonU, Repo Horizon , ,Repository, Repository Horizon University Indonesia, Repository Universitas Horizon Indonesia, Horizon.ac.id, Horizon University Indonesia, Universitas Horizon Indonesia, HorizonU, Repo Horizon ,

5_A+Systematic+Literature+Review+on+Phishing+Detection+Model.pdf
This paper introduces a unique method using supervised learning techniques in a hybrid crime detection model to identify phishing attempts on social media sites. Effective detection systems are desperately needed given the rise in criminality on…
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2