Objective: Security, privacy, perceived value, and trust are essential elements in reusing intention in an e-commerce application. The lower the security, privacy, perceived value, and trust of a consumer will reduce the reuse intention of an…
In our paper, we explore the possibility of utilizing state-of-the-art hardware architecture to develop an interactive Artificial Intelligence(AI) based virtual agent in an Internet of Things (IoT) enabled smart glass. In contrast to the traditional…
In this paper, a 180-nm CMOS ring oscillator design, made with halo-implanted transistors andoperating in the weak inversion region, is proposed, based on an undergraduate integrated circuit design course methodology for building…
Deep learning has proven to be a landmark computing approach to the computer vision domain. Hence, it has been widely applied to solve complex cognitive tasks like the detection of anomalies in surveillance videos. Anomaly detection in this case is…
Whenever there is too much information out there, it is desirable to summarize. If humans are trying to create the summary, it will take lot of time. Now to make the problem of summarizing information easier and more effortless one can automate the…
The fifth-generation (5G) mobile communication system represents a major advancement in wireless technology, relying on effective radio spectrum
management to ensure optimal performance. Among the available frequency ranges, the 5G low-band…
Tags:5G low-band,Repository, Repository Horizon University Indonesia, Repository Universitas Horizon Indonesia, Horizon.ac.id, Horizon University Indonesia, Universitas Horizon Indonesia, HorizonU, Repo Horizon , adio spectrum management,Repository, Repository Horizon University Indonesia, Repository Universitas Horizon Indonesia, Horizon.ac.id, Horizon University Indonesia, Universitas Horizon Indonesia, HorizonU, Repo Horizon , goal-seeking,Repository, Repository Horizon University Indonesia, Repository Universitas Horizon Indonesia, Horizon.ac.id, Horizon University Indonesia, Universitas Horizon Indonesia, HorizonU, Repo Horizon , predictive model,Repository, Repository Horizon University Indonesia, Repository Universitas Horizon Indonesia, Horizon.ac.id, Horizon University Indonesia, Universitas Horizon Indonesia, HorizonU, Repo Horizon , system dynamics
The processing of natural languages is an area of computer science that has gained growing attention recently. NLP helps computers recognize, in other words, the ways in which people use their language. NLP research, however, has been performed…
Relationship marketing (RM) is an important issue in every business because it is
a key component of long-term business success. Small and Medium Enterprises
(SMEs) are an important business sector in economic growth. This study aims to
find out…
This study aims to systematically examine the Pay-What-You-Want (PWYW) pricing model, which has become increasingly popular among innovative strategies. The PWYW model offers an unconventional approach by giving consumers the power to determine the…
Tags:Pay-What-You-Want,Repository, Repository Horizon University Indonesia, Repository Universitas Horizon Indonesia, Horizon.ac.id, Horizon University Indonesia, Universitas Horizon Indonesia, HorizonU, Repo Horizon , PRISMA protocol,Repository, Repository Horizon University Indonesia, Repository Universitas Horizon Indonesia, Horizon.ac.id, Horizon University Indonesia, Universitas Horizon Indonesia, HorizonU, Repo Horizon , Systematic literature review
This paper introduces a unique method using supervised learning techniques in a hybrid crime detection model to identify phishing attempts on social media sites. Effective detection systems are desperately needed given the rise in criminality on…